Skip to main content
Top
Published in: Wireless Personal Communications 4/2020

30-01-2020

Secure Key Management System Integrated in Cell-LEACH (SKMSI-CL)

Authors: Sofiane Aissani, Bournane Abbache

Published in: Wireless Personal Communications | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The existing cryptographic key management mechanisms are implemented as independent modules, they generate their own messages which consumes considerable energy. The novelty of our approach is that it does not generate any specific message by dint of steganography. Indeed, the main contribution in SKMSI-CL is the concealment the key parts in the misused spaces in the packets headers of the ZigBee standard. We exploit the messages sent by the Cell-LEACH routing protocol in order to send the key parts. We set up several types of keys to support multiple types of communications and stay in step with the data aggregation paradigm. We formally analyze some of the security properties of our protocol. Finally, we validate our performance with simulations, the results show that the network lifetime and the overall remaining energy are largely better in our scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aissani, S., Omar, M., Tari, A., & Bouakkaz, F. (2018). \(\mu\)KMS: Micro key management system for WSNs. IET Wireless Sensor Systems, 8(2), 87–97.CrossRef Aissani, S., Omar, M., Tari, A., & Bouakkaz, F. (2018). \(\mu\)KMS: Micro key management system for WSNs. IET Wireless Sensor Systems, 8(2), 87–97.CrossRef
2.
go back to reference Messai, M.-L., & Seba, H. (2016). A survey of key management schemes in multi-phase wireless sensor networks. The Journal of Computer Networks, 105, 60–74.CrossRef Messai, M.-L., & Seba, H. (2016). A survey of key management schemes in multi-phase wireless sensor networks. The Journal of Computer Networks, 105, 60–74.CrossRef
3.
go back to reference Eschenauer, L., & Gligor, V.D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47). Eschenauer, L., & Gligor, V.D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47).
4.
go back to reference Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. InIEEE symposium on security and privacy (pp. 197–213). Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. InIEEE symposium on security and privacy (pp. 197–213).
5.
go back to reference Chan, H., & Perrig, A. (2005). Pike : peer intermediaries for key establishment in sensor networks. In 24th Annual joint conference of the IEEE computer and communications societies (pp. 524–535). Chan, H., & Perrig, A. (2005). Pike : peer intermediaries for key establishment in sensor networks. In 24th Annual joint conference of the IEEE computer and communications societies (pp. 524–535).
6.
go back to reference Du, D., Xiong, H., & Wang, H. (2012). An efficient key management scheme for wireless sensor networks. Journal of Distributed Sensor Networks, 8(1), 406254.CrossRef Du, D., Xiong, H., & Wang, H. (2012). An efficient key management scheme for wireless sensor networks. Journal of Distributed Sensor Networks, 8(1), 406254.CrossRef
7.
go back to reference Fan, X., & Gong, G. (2013). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks. International Conference on Ad Hoc Networks, 111, 180–195.CrossRef Fan, X., & Gong, G. (2013). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks. International Conference on Ad Hoc Networks, 111, 180–195.CrossRef
8.
go back to reference Albakri, A., Harn, L., & Song, S. (2019). Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN). In Security and communication networks. Albakri, A., Harn, L., & Song, S. (2019). Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN). In Security and communication networks.
9.
go back to reference Suganthi, N., & Vembu, S. (2014). Energy efficient key management scheme for wireless sensor networks. Journal of Computers Communications and Control, 9(1), 71–78.CrossRef Suganthi, N., & Vembu, S. (2014). Energy efficient key management scheme for wireless sensor networks. Journal of Computers Communications and Control, 9(1), 71–78.CrossRef
10.
go back to reference Bi, J. N., & Xu, E. (2013). An Energy-efficient security node-based key management protocol for WSN. Applied Mechanics and Materials, 347(350), 2117–2121.CrossRef Bi, J. N., & Xu, E. (2013). An Energy-efficient security node-based key management protocol for WSN. Applied Mechanics and Materials, 347(350), 2117–2121.CrossRef
11.
go back to reference Zhang, Y., & Pengfei, J. (2014) An efficient and hybrid key management scheme for heterogeneous wireless sensor networks. In The 26th Chinese control and decision conference. Zhang, Y., & Pengfei, J. (2014) An efficient and hybrid key management scheme for heterogeneous wireless sensor networks. In The 26th Chinese control and decision conference.
12.
go back to reference Yektaparast, A., Nabavi, F-H., & Sarmast, A. (2012). An Improvement on LEACH protocol (cell-LEACH). In 14th International conference on advanced communication technology (pp. 992–996). Yektaparast, A., Nabavi, F-H., & Sarmast, A. (2012). An Improvement on LEACH protocol (cell-LEACH). In 14th International conference on advanced communication technology (pp. 992–996).
14.
go back to reference Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. Journal ACM Transactions on Computer Systems, 8(1), 18–36.CrossRef Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. Journal ACM Transactions on Computer Systems, 8(1), 18–36.CrossRef
15.
go back to reference Alagheband, M. R., & Aref, M. (2011). A secure key management framework for heterogeneous wireless sensor networks. Proceedings of Communications and Multimedia Security, Lecture Notes in Computer Science, 7025, 18–31.CrossRef Alagheband, M. R., & Aref, M. (2011). A secure key management framework for heterogeneous wireless sensor networks. Proceedings of Communications and Multimedia Security, Lecture Notes in Computer Science, 7025, 18–31.CrossRef
16.
go back to reference Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless sensor networks. In Proceedings of the Hawaii international conference on systems (pp. 1–10). Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless sensor networks. In Proceedings of the Hawaii international conference on systems (pp. 1–10).
Metadata
Title
Secure Key Management System Integrated in Cell-LEACH (SKMSI-CL)
Authors
Sofiane Aissani
Bournane Abbache
Publication date
30-01-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07142-3

Other articles of this Issue 4/2020

Wireless Personal Communications 4/2020 Go to the issue