Skip to main content
Erschienen in: Wireless Personal Communications 1/2017

29.05.2017

Energy Efficient Key Distribution and Management Scheme in Wireless Sensor Networks

verfasst von: Tafadzwa Tapuwa Chakavarika, Shashi Kant Gupta, Brijesh Kumar Chaurasia

Erschienen in: Wireless Personal Communications | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With vast areas of application ranging from household automation systems through industrial plant monitoring systems to military surveillance systems, security has become a major concern especially in aggressive environments like battle fields. The sensor nodes along with the data, while in transit, must be protected from malicious attackers. Though using public key cryptographic schemes like RSA and elliptic curve cryptography would provide sufficient security. Their use has been limited owing to their computationally intensive operations which conflict with the resource limitations in wireless sensor nodes. Key pre-distribution has proved to be the most feasible amongst key management schemes in wireless sensor networks (WSNs). Research in key management continues to take center stage due to its importance amongst security primitives in WSNs. An improved energy efficient key distribution and management scheme is proposed in this paper. Results and simulations show that the proposed scheme conserves energy and performs better than other existing techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and communications security-CCS ‘02, (pp. 41–47). doi:10.1145/586110.586117. Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and communications security-CCS ‘02, (pp. 41–47). doi:10.​1145/​586110.​586117.
5.
Zurück zum Zitat Chan, H., & Perrig, A. (2003). Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11–14 May 2003, (pp. 197–213). Berkeley: California. Chan, H., & Perrig, A. (2003). Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11–14 May 2003, (pp. 197–213). Berkeley: California.
6.
Zurück zum Zitat Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2003). A low-energy key management protocol for wireless sensor networks. In Proceedings of the Eighth IEEE Symposium on Computers and Communications ISCC (Vol. 1, pp. 335–340). doi:10.1109/iscc.2003.1214142. Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2003). A low-energy key management protocol for wireless sensor networks. In Proceedings of the Eighth IEEE Symposium on Computers and Communications ISCC (Vol. 1, pp. 335–340). doi:10.​1109/​iscc.​2003.​1214142.
7.
Zurück zum Zitat Blom, R. (1985). Proceedings of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques (pp. 335–338). Blom, R. (1985). Proceedings of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques (pp. 335–338).
8.
Zurück zum Zitat Du, W., Deng, J., Han, Y., & Varshney, P. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communication Security-CCS ‘03 (pp. 42–51). doi:10.1145/948109.948118. Du, W., Deng, J., Han, Y., & Varshney, P. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communication Security-CCS ‘03 (pp. 42–51). doi:10.​1145/​948109.​948118.
9.
Zurück zum Zitat Chan, H., & Perrig, A. (2005). PIKE—Peer intermediaries for key establishment in sensor networks. In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (Vol. 1, pp. 524–535). doi:10.1109/infcom.2005.1497920. Chan, H., & Perrig, A. (2005). PIKE—Peer intermediaries for key establishment in sensor networks. In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (Vol. 1, pp. 524–535). doi:10.​1109/​infcom.​2005.​1497920.
10.
Zurück zum Zitat Cheng, Y., & Agrawal, D. (2005). Efficient pairwise key establishment and management in static wireless sensor networks. In IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (Vol. 7, pp. 544–550). doi:10.1109/mahss.2005.1542842. Cheng, Y., & Agrawal, D. (2005). Efficient pairwise key establishment and management in static wireless sensor networks. In IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (Vol. 7, pp. 544–550). doi:10.​1109/​mahss.​2005.​1542842.
13.
Zurück zum Zitat López, C. P. (2014). MATLAB programming for numerical analysis (pp. 200–203). Madrid: Apress. López, C. P. (2014). MATLAB programming for numerical analysis (pp. 200–203). Madrid: Apress.
15.
Zurück zum Zitat Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In 11th IEEE International Conference on Network Protocols, 2003 Proceedings (Vol. 1, pp. 326–335). doi:10.1109/icnp.2003.1249782. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In 11th IEEE International Conference on Network Protocols, 2003 Proceedings (Vol. 1, pp. 326–335). doi:10.​1109/​icnp.​2003.​1249782.
16.
Zurück zum Zitat Abdallah, W., Boudriga, N., Kim, D., & An, S. (2014). An efficient and scalable key management mechanism for wireless sensor networks. In 16th International Conference on Advanced Communication Technology, (pp. 687–692). doi:10.1109/icact.2014.6779051. Abdallah, W., Boudriga, N., Kim, D., & An, S. (2014). An efficient and scalable key management mechanism for wireless sensor networks. In 16th International Conference on Advanced Communication Technology, (pp. 687–692). doi:10.​1109/​icact.​2014.​6779051.
17.
Zurück zum Zitat Chakavarika, T. T., Chaurasia, B. K., Gupta, S. K. (2016). Performance evaluation of a polynomial based key management scheme in wireless sensor networks. In Proceedings of the International Conference on Communication and Signal Processing (Vol. 6, pp. 1768–1772). Chakavarika, T. T., Chaurasia, B. K., Gupta, S. K. (2016). Performance evaluation of a polynomial based key management scheme in wireless sensor networks. In Proceedings of the International Conference on Communication and Signal Processing (Vol. 6, pp. 1768–1772).
19.
Zurück zum Zitat Banerjee K., Sharma, H., & Chaurasia, B. K. (2014). Secure communication for cluster based wireless sensor network. In IEEE CICN (pp. 867–871). doi:10.1109/CICN.2014.183. Banerjee K., Sharma, H., & Chaurasia, B. K. (2014). Secure communication for cluster based wireless sensor network. In IEEE CICN (pp. 867–871). doi:10.​1109/​CICN.​2014.​183.
20.
Zurück zum Zitat Gupta, V., & Rajoo Pandey, R. (2016). An improved energy aware distributed unequal clustering protocol for heterogeneous wireless sensor networks. International Journal of Engineering Science and Technology, 19(5), 1050–1058. doi:10.1016/j.jestch.2015.12.015.CrossRef Gupta, V., & Rajoo Pandey, R. (2016). An improved energy aware distributed unequal clustering protocol for heterogeneous wireless sensor networks. International Journal of Engineering Science and Technology, 19(5), 1050–1058. doi:10.​1016/​j.​jestch.​2015.​12.​015.CrossRef
21.
22.
Zurück zum Zitat Kim, J. M., Cho, J. S., Jung, S. M., & Chung, T. M. (2007). An energy-efficient dynamic key management in wireless sensor networks. In The 9th International Conference on Advanced Communication Technology (pp. 2148–2153). doi:10.1109/ICACT.2007.358798. Kim, J. M., Cho, J. S., Jung, S. M., & Chung, T. M. (2007). An energy-efficient dynamic key management in wireless sensor networks. In The 9th International Conference on Advanced Communication Technology (pp. 2148–2153). doi:10.​1109/​ICACT.​2007.​358798.
Metadaten
Titel
Energy Efficient Key Distribution and Management Scheme in Wireless Sensor Networks
verfasst von
Tafadzwa Tapuwa Chakavarika
Shashi Kant Gupta
Brijesh Kumar Chaurasia
Publikationsdatum
29.05.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4551-2

Weitere Artikel der Ausgabe 1/2017

Wireless Personal Communications 1/2017 Zur Ausgabe

Neuer Inhalt