Skip to main content
Top
Published in: Annals of Telecommunications 1-2/2010

01-02-2010

MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks

Authors: Muhammad Khaliq-ur-Rahman Raazi Syed, Heejo Lee, Sungyoung Lee, Young-Koo Lee

Published in: Annals of Telecommunications | Issue 1-2/2010

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor networks (WSN) are susceptible to node capture and many network levels attacks. In order to provide protection against such threats, WSNs require lightweight and scalable key management schemes because the nodes are resource-constrained and high in number. Also, the effect of node compromise should be minimized and node capture should not hamper the normal working of a network. In this paper, we present an exclusion basis system-based key management scheme called MUQAMI+ for large-scale clustered sensor networks. We have distributed the responsibility of key management to multiple nodes within clusters, avoiding single points of failure and getting rid of costly inter-cluster communication. Our scheme is scalable and highly efficient in terms of re-keying and compromised node revocation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
In the conference version, we named this protocol MUQAMI. Since it is much improved in this journal version, we have named it MUQAMI+.
 
Literature
2.
go back to reference Youssef A, Agrawala A, Younis M (2005) Accurate anchor-free localization in wireless sensor networks. In: First IEEE workshop information assurance in wireless sensor networks (WSNIA ’05) Youssef A, Agrawala A, Younis M (2005) Accurate anchor-free localization in wireless sensor networks. In: First IEEE workshop information assurance in wireless sensor networks (WSNIA ’05)
3.
go back to reference Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Networks 38(4):393–422CrossRef Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Networks 38(4):393–422CrossRef
4.
go back to reference Amin S, Siddiqui M, Hong C (2008) Detecting jamming attacks in ubiquitous sensor networks. In: IEEE sensors applications symposium 2008, pp 40–45 Amin S, Siddiqui M, Hong C (2008) Detecting jamming attacks in ubiquitous sensor networks. In: IEEE sensors applications symposium 2008, pp 40–45
6.
go back to reference Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: SP ’03: proceedings of the 2003 IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC, p 197 Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: SP ’03: proceedings of the 2003 IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC, p 197
7.
go back to reference Dierks T, Allen C (1999) The TLS protocol version 1.0 Dierks T, Allen C (1999) The TLS protocol version 1.0
8.
go back to reference Dini G, Savino IM (2006) An efficient key revocation protocol for wireless sensor networks. In: WOWMOM ’06: proceedings of the 2006 international symposium on on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, DC, pp 450–452. doi:10.1109/WOWMOM.2006.23 CrossRef Dini G, Savino IM (2006) An efficient key revocation protocol for wireless sensor networks. In: WOWMOM ’06: proceedings of the 2006 international symposium on on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, DC, pp 450–452. doi:10.​1109/​WOWMOM.​2006.​23 CrossRef
9.
go back to reference Du W, Deng J, Han YS, Varshney PK (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS ’03: proceedings of the 10th ACM conference on computer and communications security. ACM, New York, pp 42–51. doi:10.1145/948109.948118 CrossRef Du W, Deng J, Han YS, Varshney PK (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS ’03: proceedings of the 10th ACM conference on computer and communications security. ACM, New York, pp 42–51. doi:10.​1145/​948109.​948118 CrossRef
12.
go back to reference Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: CCS ’02: proceedings of the 9th ACM conference on computer and communications security. ACM, New York, pp 41–47. doi:10.1145/586110.586117 CrossRef Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: CCS ’02: proceedings of the 9th ACM conference on computer and communications security. ACM, New York, pp 41–47. doi:10.​1145/​586110.​586117 CrossRef
13.
go back to reference Ghumman K (2006) Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Trans Parallel Distrib Syst 17(8):865–882. doi:10.1109/TPDS.2006.106 (Senior Member-Mohamed F. Younis and Senior Member-Mohamed Eltoweissy)CrossRef Ghumman K (2006) Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Trans Parallel Distrib Syst 17(8):865–882. doi:10.​1109/​TPDS.​2006.​106 (Senior Member-Mohamed F. Younis and Senior Member-Mohamed Eltoweissy)CrossRef
14.
go back to reference Gupta G, Younis M (2003) Load-balanced clustering of wireless sensor networks. In: International conference on communications (ICC ’03), pp 1848–1852 Gupta G, Younis M (2003) Load-balanced clustering of wireless sensor networks. In: International conference on communications (ICC ’03), pp 1848–1852
15.
go back to reference Intanagonwiwat C, Govindan R, Estrin D (2000) Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: ACM mobile computing and networking (Mobicom’00), pp 56–67 Intanagonwiwat C, Govindan R, Estrin D (2000) Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: ACM mobile computing and networking (Mobicom’00), pp 56–67
16.
go back to reference Karlof C, Li Y, Polastre J (2003) Arrive: an architecture for robust routing in volatile environments. Tech. Rep. CSD-03-1233, University of California at Berkeley Karlof C, Li Y, Polastre J (2003) Arrive: an architecture for robust routing in volatile environments. Tech. Rep. CSD-03-1233, University of California at Berkeley
17.
go back to reference Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: SenSys ’04: proceedings of the 2nd international conference on embedded networked sensor systems. ACM, New York, pp 162–175. doi:10.1145/1031495.1031515 CrossRef Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: SenSys ’04: proceedings of the 2nd international conference on embedded networked sensor systems. ACM, New York, pp 162–175. doi:10.​1145/​1031495.​1031515 CrossRef
18.
go back to reference Kohl J, Neuman C (1993) The Kerberos network authentication service (v5) Kohl J, Neuman C (1993) The Kerberos network authentication service (v5)
20.
go back to reference Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Networks 43(4):499–518MATHCrossRef Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Networks 43(4):499–518MATHCrossRef
21.
go back to reference Li G, He J, Fu Y (2006) A hexagon-based key predistribution scheme in sensor networks. In: ICPPW ’06: proceedings of the 2006 international conference workshops on parallel processing. IEEE Computer Society, Washington, DC, pp 175–180. doi:10.1109/ICPPW.2006.9 Li G, He J, Fu Y (2006) A hexagon-based key predistribution scheme in sensor networks. In: ICPPW ’06: proceedings of the 2006 international conference workshops on parallel processing. IEEE Computer Society, Washington, DC, pp 175–180. doi:10.​1109/​ICPPW.​2006.​9
22.
go back to reference Madden S, Szewczyk R, Franklin MJ, Culler D (2002) Supporting aggregate queries over ad-hoc wireless sensor networks. In: WMCSA ’02: proceedings of the fourth IEEE workshop on mobile computing systems and applications. IEEE Computer Society, Washington, DC, p 49CrossRef Madden S, Szewczyk R, Franklin MJ, Culler D (2002) Supporting aggregate queries over ad-hoc wireless sensor networks. In: WMCSA ’02: proceedings of the fourth IEEE workshop on mobile computing systems and applications. IEEE Computer Society, Washington, DC, p 49CrossRef
23.
go back to reference Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton
24.
go back to reference Paek KJ, Kim J, Hwang CS, Song US (2007) An energy-efficient key management protocol for large-scale wireless sensor networks. In: MUE ’07: proceedings of the 2007 international conference on multimedia and ubiquitous engineering. IEEE Computer Society, Washington, DC, pp 201–206. doi:10.1109/MUE.2007.74 CrossRef Paek KJ, Kim J, Hwang CS, Song US (2007) An energy-efficient key management protocol for large-scale wireless sensor networks. In: MUE ’07: proceedings of the 2007 international conference on multimedia and ubiquitous engineering. IEEE Computer Society, Washington, DC, pp 201–206. doi:10.​1109/​MUE.​2007.​74 CrossRef
25.
go back to reference Seetharam D, Rhee S (2004) An efficient pseudo random number generator for low-power sensor networks. In: LCN ’04: proceedings of the 29th annual IEEE international conference on local computer networks. IEEE Computer Society, Washington, DC, pp 560–562. doi:10.1109/LCN.2004.18 CrossRef Seetharam D, Rhee S (2004) An efficient pseudo random number generator for low-power sensor networks. In: LCN ’04: proceedings of the 29th annual IEEE international conference on local computer networks. IEEE Computer Society, Washington, DC, pp 560–562. doi:10.​1109/​LCN.​2004.​18 CrossRef
26.
go back to reference Shaikh R, Lee S, Khan M, Song Y (2006) LSec: lightweight security protocol for distributed wireless sensor networks. In: 11th IFIP international conference on personal wireless communications PWC’06. LNCS, vol 4217, Spain, pp 367–377 Shaikh R, Lee S, Khan M, Song Y (2006) LSec: lightweight security protocol for distributed wireless sensor networks. In: 11th IFIP international conference on personal wireless communications PWC’06. LNCS, vol 4217, Spain, pp 367–377
27.
go back to reference Tilak S, Abu-Ghazaleh N, Heinzelman W (2002) A taxonomy of wireless microsensor network models. ACM Mobile Comput Commun 6(2):1–8CrossRef Tilak S, Abu-Ghazaleh N, Heinzelman W (2002) A taxonomy of wireless microsensor network models. ACM Mobile Comput Commun 6(2):1–8CrossRef
28.
go back to reference Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In: CASES ’03: proceedings of the 2003 international conference on compilers, architecture and synthesis for embedded systems. ACM, New York, pp 188–197. doi:10.1145/951710.951737 Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In: CASES ’03: proceedings of the 2003 international conference on compilers, architecture and synthesis for embedded systems. ACM, New York, pp 188–197. doi:10.​1145/​951710.​951737
29.
go back to reference Xing G, Lu C, Zhang Y, Huang Q, Pless R (2005) Minimum power configuration in wireless sensor networks. In: MobiHoc ’05: proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 390–401. doi:10.1145/1062689.1062738 CrossRef Xing G, Lu C, Zhang Y, Huang Q, Pless R (2005) Minimum power configuration in wireless sensor networks. In: MobiHoc ’05: proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 390–401. doi:10.​1145/​1062689.​1062738 CrossRef
Metadata
Title
MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks
Authors
Muhammad Khaliq-ur-Rahman Raazi Syed
Heejo Lee
Sungyoung Lee
Young-Koo Lee
Publication date
01-02-2010
Publisher
Springer-Verlag
Published in
Annals of Telecommunications / Issue 1-2/2010
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-009-0123-0

Other articles of this Issue 1-2/2010

Annals of Telecommunications 1-2/2010 Go to the issue

Premium Partner