Skip to main content
Erschienen in: The Journal of Supercomputing 12/2015

01.12.2015

A lightweight key management scheme for wireless sensor networks

verfasst von: Mohamed-Lamine Messai, Hamida Seba, Makhlouf Aliouat

Erschienen in: The Journal of Supercomputing | Ausgabe 12/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The use of wireless sensor networks (WSNs) in any real-world application requires a certain level of security. To provide security of operations such as message exchange, key management schemes have to be well adapted to the particularities of WSNs. This paper proposes a novel key management scheme called SKM for sequence-based key management in WSNs. In SKM, sensor nodes are pre-distributed with the first term and the recursive formula of a numerical sequence. This two tiny pre-distributed information will ensure the establishment of pairwise keys to each sensor node with its neighbors after its deployment with a small amount of computation. The security analysis of SKM shows its efficiency. Simulation results confirm that SKM is lightweight in term of node’s resources and has a good resilience against node compromising attacks compared to the main existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114CrossRef
2.
Zurück zum Zitat Alemdar A, Ibnkahla M (2007) Wireless sensor networks: applications and challenges. In: 9th international symposium on signal processing and its applications, pp 1–6. IEEE Alemdar A, Ibnkahla M (2007) Wireless sensor networks: applications and challenges. In: 9th international symposium on signal processing and its applications, pp 1–6. IEEE
3.
Zurück zum Zitat Anderson R, Chan H, Perrig A (2004) Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE international conference on network protocols, pp 206–215. IEEE Anderson R, Chan H, Perrig A (2004) Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE international conference on network protocols, pp 206–215. IEEE
4.
Zurück zum Zitat Baojiang C, Ziyue W, Bing Z, Xiaobing L, Yuemin D (2015) Enhanced key management protocols for wireless sensor networks. Mob Inf Syst 2015:10. doi:10.1155/2015/627548 Baojiang C, Ziyue W, Bing Z, Xiaobing L, Yuemin D (2015) Enhanced key management protocols for wireless sensor networks. Mob Inf Syst 2015:10. doi:10.​1155/​2015/​627548
5.
Zurück zum Zitat Bechkit W, Challal Y, Bouabdallah A, Tarokh V (2013) A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans Wirel Commun 12(2):948–959CrossRef Bechkit W, Challal Y, Bouabdallah A, Tarokh V (2013) A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans Wirel Commun 12(2):948–959CrossRef
6.
Zurück zum Zitat Blom R (1985) An optimal class of symmetric key generation systems. In: Brickell EF (ed) CRYPTO. LNCS, vol 740. Springer, Heidelberg, pp 471–486 Blom R (1985) An optimal class of symmetric key generation systems. In: Brickell EF (ed) CRYPTO. LNCS, vol 740. Springer, Heidelberg, pp 471–486
7.
Zurück zum Zitat Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1993) Perfectly-secure key distribution for dynamic conferences. In: Brickell EF (ed) CRYPTO. LNCS, vol 740. Springer, Heidelberg, PP 471–486 Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1993) Perfectly-secure key distribution for dynamic conferences. In: Brickell EF (ed) CRYPTO. LNCS, vol 740. Springer, Heidelberg, PP 471–486
8.
Zurück zum Zitat Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010 Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010
9.
Zurück zum Zitat Castelluccia C, Spognardi A (2007) Rok: a robust key pre-distribution protocol for multi-phase wireless sensor networks. In: Third international conference on security and privacy in communications networks and the workshops, 2007, pp 351–360. IEEE Castelluccia C, Spognardi A (2007) Rok: a robust key pre-distribution protocol for multi-phase wireless sensor networks. In: Third international conference on security and privacy in communications networks and the workshops, 2007, pp 351–360. IEEE
10.
Zurück zum Zitat Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the symposium on security and privacy 2003, pp 197–213. IEEE Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the symposium on security and privacy 2003, pp 197–213. IEEE
11.
Zurück zum Zitat Chen CL, Lin IH et al (2010) Location-aware dynamic session-key management for grid-based wireless sensor networks. Sensors 10(8):7347–7370CrossRef Chen CL, Lin IH et al (2010) Location-aware dynamic session-key management for grid-based wireless sensor networks. Sensors 10(8):7347–7370CrossRef
12.
Zurück zum Zitat Cvrcek D, Svenda P (2006) Smart dust security-key infection revisited. Electr Notes Theor Comput Sci 157(3):11–25CrossRef Cvrcek D, Svenda P (2006) Smart dust security-key infection revisited. Electr Notes Theor Comput Sci 157(3):11–25CrossRef
13.
Zurück zum Zitat Das AK (2012) A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int J Inf Secur 11(3):189–211CrossRef Das AK (2012) A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int J Inf Secur 11(3):189–211CrossRef
14.
Zurück zum Zitat Dutertre B, Cheung S, Levy J (2004) Lightweight key management in wireless sensor networks by leveraging initial trust. Technical report SRI-SDL-04-02, SRI International Dutertre B, Cheung S, Levy J (2004) Lightweight key management in wireless sensor networks by leveraging initial trust. Technical report SRI-SDL-04-02, SRI International
15.
Zurück zum Zitat Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, pp 41–47. ACM (2002) Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, pp 41–47. ACM (2002)
16.
Zurück zum Zitat Jilna P, Pattathil DP (2015) A key management technique based on elliptic curves for static wireless sensor networks. Secur Commun Netw. doi:10.1002/sec.1295 Jilna P, Pattathil DP (2015) A key management technique based on elliptic curves for static wireless sensor networks. Secur Commun Netw. doi:10.​1002/​sec.​1295
17.
Zurück zum Zitat Lai B, Kim S, Verbauwhede I (2002) Scalable session key construction protocol for wireless sensor networks. In: IEEE workshop on large scale real time and embedded systems (LARTES), p 7. IEEE Lai B, Kim S, Verbauwhede I (2002) Scalable session key construction protocol for wireless sensor networks. In: IEEE workshop on large scale real time and embedded systems (LARTES), p 7. IEEE
18.
Zurück zum Zitat Liu D, Ning P (2003) Establishing pairwise keys in distributed sensor networks, 10th ACM ccs’03. Washington DC Liu D, Ning P (2003) Establishing pairwise keys in distributed sensor networks, 10th ACM ccs’03. Washington DC
19.
Zurück zum Zitat Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inf Syst Secur (TISSEC) 8(1):41–77CrossRef Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inf Syst Secur (TISSEC) 8(1):41–77CrossRef
21.
Zurück zum Zitat Min X, Wei-Ren S, Chang-Jiang J, Ying Z (2010) Energy efficient clustering algorithm for maximizing lifetime of wireless sensor networks. AEU-Int J Electr Commun 64(4):289–298CrossRef Min X, Wei-Ren S, Chang-Jiang J, Ying Z (2010) Energy efficient clustering algorithm for maximizing lifetime of wireless sensor networks. AEU-Int J Electr Commun 64(4):289–298CrossRef
22.
Zurück zum Zitat Perrig A, Szewczyk R, Tygar J, Wen V, Culler DE (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521–534MATHCrossRef Perrig A, Szewczyk R, Tygar J, Wen V, Culler DE (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521–534MATHCrossRef
23.
Zurück zum Zitat Rahman M, Sampalli S (2015) An efficient pairwise and group key management protocol for wireless sensor network. Wirel Person Commun 84(3):2035–2053 Rahman M, Sampalli S (2015) An efficient pairwise and group key management protocol for wireless sensor network. Wirel Person Commun 84(3):2035–2053
24.
Zurück zum Zitat Sarimurat S, Levi A (2013) Hag: hash graph based key predistribution scheme for multiphase wireless sensor networks. In: IEEE international conference on communications (ICC), pp 2079–2083. IEEE Sarimurat S, Levi A (2013) Hag: hash graph based key predistribution scheme for multiphase wireless sensor networks. In: IEEE international conference on communications (ICC), pp 2079–2083. IEEE
25.
Zurück zum Zitat Standard SH (1995) Fips publication 180–1. 17:1–24 Standard SH (1995) Fips publication 180–1. 17:1–24
26.
Zurück zum Zitat Suganthi N, Vembu S (2014) Energy efficient key management scheme for wireless sensor networks. Int J Comput Commun Control 9(1):71–78CrossRef Suganthi N, Vembu S (2014) Energy efficient key management scheme for wireless sensor networks. Int J Comput Commun Control 9(1):71–78CrossRef
27.
Zurück zum Zitat Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59–64. ACM Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59–64. ACM
28.
Zurück zum Zitat Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11):2314–2341CrossRef Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11):2314–2341CrossRef
29.
Zurück zum Zitat Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52(12):2292–2330CrossRef Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52(12):2292–2330CrossRef
30.
Zurück zum Zitat Yoneki E, Bacon J (2005) A survey of wireless sensor network technologies: research trends and middleware’s role. University of Cambridge TR 646, Cambridge Yoneki E, Bacon J (2005) A survey of wireless sensor network technologies: research trends and middleware’s role. University of Cambridge TR 646, Cambridge
31.
Zurück zum Zitat Zhang J, Varadharajan V (2010) Wireless sensor network key management survey and taxonomy. J Netw Comput Appl 33(2):63–75CrossRef Zhang J, Varadharajan V (2010) Wireless sensor network key management survey and taxonomy. J Netw Comput Appl 33(2):63–75CrossRef
32.
Zurück zum Zitat Zhu S, Setia S, Jajodia S (2003) Leap: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM conference on computer and communications security. ACM Zhu S, Setia S, Jajodia S (2003) Leap: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM conference on computer and communications security. ACM
33.
Zurück zum Zitat Zhu S, Setia S, Jajodia S (2006) Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sens Netw (TOSN) 2(4):500–528CrossRef Zhu S, Setia S, Jajodia S (2006) Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sens Netw (TOSN) 2(4):500–528CrossRef
Metadaten
Titel
A lightweight key management scheme for wireless sensor networks
verfasst von
Mohamed-Lamine Messai
Hamida Seba
Makhlouf Aliouat
Publikationsdatum
01.12.2015
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 12/2015
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1534-5

Weitere Artikel der Ausgabe 12/2015

The Journal of Supercomputing 12/2015 Zur Ausgabe