Skip to main content
Top
Published in: Wireless Personal Communications 4/2015

01-08-2015

LKH++ Based Group Key Management Scheme for Wireless Sensor Network

Authors: Wenbin Yao, Si Han, Xiaoyong Li

Published in: Wireless Personal Communications | Issue 4/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes a secure low-power group key management scheme based on LKH++. In our scheme, we construct a secure tree to manage group keys. The building method of key tree and holding way of keys are proposed by our scheme to reduce computation and storage overhead on each sensor node. In addition, WLKH supports rekeying to enhance network security and survivability against node capture. Performance analysis shows WLKH is highly efficient in term of security, computation and key storage.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.CrossRef Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.CrossRef
2.
go back to reference Sha, K., Gehlot, J., & Greve, R. (2013). Multipath routing techniques in wireless sensor networks: A survey. Wireless Personal Communications, 70(2), 807–829.CrossRef Sha, K., Gehlot, J., & Greve, R. (2013). Multipath routing techniques in wireless sensor networks: A survey. Wireless Personal Communications, 70(2), 807–829.CrossRef
3.
go back to reference Liu, Y., Zhang, Q., & Ni, L. M. (2010). Opportunity-based topology control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 21(3), 405–416.CrossRef Liu, Y., Zhang, Q., & Ni, L. M. (2010). Opportunity-based topology control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 21(3), 405–416.CrossRef
4.
go back to reference Aslam, N., Robertson, W., & Phillips, W. (2009). Algorithms for relay node selection in randomly deployed homogeneous cluster-based wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 8(1), 5–20. Aslam, N., Robertson, W., & Phillips, W. (2009). Algorithms for relay node selection in randomly deployed homogeneous cluster-based wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 8(1), 5–20.
5.
go back to reference Ding, G., Wang, J., & Wu, Q. (2013). Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate. IEEE Sensors Journal, 13(11), 4247–4255.CrossRef Ding, G., Wang, J., & Wu, Q. (2013). Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate. IEEE Sensors Journal, 13(11), 4247–4255.CrossRef
6.
go back to reference Viani, F., Robol, F., & Polo, A. (2013). Wireless architectures for heterogeneous sensing in smart home applications: Concepts and real implementation. Proceedings of IEEE, 101(11), 1–16.CrossRef Viani, F., Robol, F., & Polo, A. (2013). Wireless architectures for heterogeneous sensing in smart home applications: Concepts and real implementation. Proceedings of IEEE, 101(11), 1–16.CrossRef
7.
go back to reference Zois, D. S., Levorato, M., & Mitra, U. (2013). Energy-efficient, heterogeneous sensor selection for physical activity detection in wireless body area networks. IEEE Transactions on Signal Processing, 61(5–8), 1581–1594.MathSciNetCrossRef Zois, D. S., Levorato, M., & Mitra, U. (2013). Energy-efficient, heterogeneous sensor selection for physical activity detection in wireless body area networks. IEEE Transactions on Signal Processing, 61(5–8), 1581–1594.MathSciNetCrossRef
8.
go back to reference Alonso, R. S., Tapia, D. I., & Bajo, J. (2013). Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks, 11(1), 151–166.CrossRef Alonso, R. S., Tapia, D. I., & Bajo, J. (2013). Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks, 11(1), 151–166.CrossRef
9.
go back to reference Khedr, A. M., & Osamy, W. (2011). Minimum perimeter coverage of query regions in a heterogeneous wireless sensor network. Information Sciences, 181(15), 3130–3142.CrossRef Khedr, A. M., & Osamy, W. (2011). Minimum perimeter coverage of query regions in a heterogeneous wireless sensor network. Information Sciences, 181(15), 3130–3142.CrossRef
10.
go back to reference Yoo, S. J., Lee, D. H., & Yang, H. S. (2013). A novel secure scheme for wireless Ad Hoc network. Wireless Personal Communications, 73(2), 197–205.CrossRef Yoo, S. J., Lee, D. H., & Yang, H. S. (2013). A novel secure scheme for wireless Ad Hoc network. Wireless Personal Communications, 73(2), 197–205.CrossRef
11.
go back to reference Chen, C. M., Zheng, X., & Wu, T. Y. (2014). A complete hierarchical key management scheme for heterogeneous wireless sensor networks. The Scientific World Journal, 2014. Chen, C. M., Zheng, X., & Wu, T. Y. (2014). A complete hierarchical key management scheme for heterogeneous wireless sensor networks. The Scientific World Journal, 2014.
12.
go back to reference Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks, In IWCMC ’07 Proceedings of the 2007 international conference on wireless communications and mobile computing, 388–392. Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks, In IWCMC ’07 Proceedings of the 2007 international conference on wireless communications and mobile computing, 388–392.
13.
go back to reference Brown, J., Du, X., & Nygrad, K. (2007). An efficient public-key-based heterogeneous sensor network key distribution scheme. Ad Hoc Networks, 5(1), 24–34.CrossRef Brown, J., Du, X., & Nygrad, K. (2007). An efficient public-key-based heterogeneous sensor network key distribution scheme. Ad Hoc Networks, 5(1), 24–34.CrossRef
14.
go back to reference Traynor, P., Kumar, R., & Choi, H. (2007). Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing, 6(6), 663–677.CrossRef Traynor, P., Kumar, R., & Choi, H. (2007). Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing, 6(6), 663–677.CrossRef
15.
go back to reference Zhang, W., Zhu, S., & Cao, G. (2009). Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks, 7(6), 1229–1242.CrossRef Zhang, W., Zhu, S., & Cao, G. (2009). Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks, 7(6), 1229–1242.CrossRef
16.
go back to reference Banihashemian, S., Bafghi, A. G., & Moghaddam, M. H. Y. (2011). Centralized key management scheme in wireless sensor networks. Wireless Personal Communications, 60(3), 463–474.CrossRef Banihashemian, S., Bafghi, A. G., & Moghaddam, M. H. Y. (2011). Centralized key management scheme in wireless sensor networks. Wireless Personal Communications, 60(3), 463–474.CrossRef
17.
go back to reference Zhang, X., He, J., & Wei, Q. (2011). EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011, 12.CrossRef Zhang, X., He, J., & Wei, Q. (2011). EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011, 12.CrossRef
18.
go back to reference Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2013) A low-energy key management protocol for wireless sensor networks, Eighth IEEE symposium on computers and communications, 335–340(2013). Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2013) A low-energy key management protocol for wireless sensor networks, Eighth IEEE symposium on computers and communications, 335–340(2013).
19.
go back to reference Ya-nan, L., Jian, W., & He, D. (2008). Intra-cluster key sharing in hierarchical sensor networks. IET Wireless Sensor Systems, 3(3), 172–182.CrossRef Ya-nan, L., Jian, W., & He, D. (2008). Intra-cluster key sharing in hierarchical sensor networks. IET Wireless Sensor Systems, 3(3), 172–182.CrossRef
21.
go back to reference Seo, S. H., Won, J., & Sultana, S. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.CrossRef Seo, S. H., Won, J., & Sultana, S. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.CrossRef
22.
go back to reference Di Pietro, R., Mancini, L. V., & Jajodia, S. (2002). Efficient and secure keys management for wireless mobile communications. In Proceedings of the second ACM international workshop on principles of mobile computing. 2002, 66–73. Di Pietro, R., Mancini, L. V., & Jajodia, S. (2002). Efficient and secure keys management for wireless mobile communications. In Proceedings of the second ACM international workshop on principles of mobile computing. 2002, 66–73.
23.
go back to reference Karaboga, D., Okdem, S., & Ozturk, C. (2012). Cluster based wireless sensor network routing using artilcial bee colony algorithm. Wireless Networks, 18(7), 847–860.CrossRef Karaboga, D., Okdem, S., & Ozturk, C. (2012). Cluster based wireless sensor network routing using artilcial bee colony algorithm. Wireless Networks, 18(7), 847–860.CrossRef
24.
go back to reference Kellokoski, J., & Koskinen, J. (2014). Always best connected heterogeneous network concept. Wireless Personal Communications, 75(1), 63–80.CrossRef Kellokoski, J., & Koskinen, J. (2014). Always best connected heterogeneous network concept. Wireless Personal Communications, 75(1), 63–80.CrossRef
Metadata
Title
LKH++ Based Group Key Management Scheme for Wireless Sensor Network
Authors
Wenbin Yao
Si Han
Xiaoyong Li
Publication date
01-08-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2582-0

Other articles of this Issue 4/2015

Wireless Personal Communications 4/2015 Go to the issue