Skip to main content
Erschienen in: Wireless Personal Communications 3/2015

01.10.2015

An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network

verfasst von: Musfiq Rahman, Srinivas Sampalli

Erschienen in: Wireless Personal Communications | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Although security services depend on the key management system, they do not specify how to exchange keys securely. Many security-critical applications depend on key management processes to operate but also demand a high level of fault tolerance when a node is compromised. Due to constraints on wireless sensor networks (WSNs) traditional security mechanisms cannot be applied directly. Moreover, to be robust, the key management protocol should not only be lightweight but also should support both pairwise and group-wise communications. In this paper, we propose an efficient key management protocol for WSNs that provides support for both pairwise and group-wise key management. We have implemented our scheme in the TelosB mote and present some experimental results on computational, communication, energy and storage overheads. We compared the performance with other symmetric and public key based key management protocols used in WSNs. The results show our protocol is efficient in terms of computation, communication and energy overhead. It can update both pairwise and group keys to support key revocation, key refresh and new node addition.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agarwal, R., Martinez-Catala, R. V., Harte, S., Segard, C., & O’Flynn, B. (2008). Modeling power in multi-functionality sensor network applications. In Second international conference on sensor technologies and applications, 2008. SENSORCOMM ’08 (pp. 507–512). Agarwal, R., Martinez-Catala, R. V., Harte, S., Segard, C., & O’Flynn, B. (2008). Modeling power in multi-functionality sensor network applications. In Second international conference on sensor technologies and applications, 2008. SENSORCOMM ’08 (pp. 507–512).
2.
Zurück zum Zitat Blom, R. (1985). An optimal class of symmetric key generation systems. In Proceedings of the EUROCRYPT 84 workshop on advances in cryptology: Theory and application of cryptographic techniques (pp. 335–338). New York, NY, USA: Springer-Verlag New York Inc. Blom, R. (1985). An optimal class of symmetric key generation systems. In Proceedings of the EUROCRYPT 84 workshop on advances in cryptology: Theory and application of cryptographic techniques (pp. 335–338). New York, NY, USA: Springer-Verlag New York Inc.
3.
Zurück zum Zitat Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In CRYPTO ’92: Proceedings of the 12th annual international cryptology conference on advances in cryptology (pp. 471–486). London, UK: Springer-Verlag. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In CRYPTO ’92: Proceedings of the 12th annual international cryptology conference on advances in cryptology (pp. 471–486). London, UK: Springer-Verlag.
4.
Zurück zum Zitat Boujelben, M., Youssef, H., & Abid, M. (2008). An efficient scheme for key pre-distribution in wireless sensor networks. In IEEE international conference on wireless and mobile computing, networking and communication (pp. 532–537). Boujelben, M., Youssef, H., & Abid, M. (2008). An efficient scheme for key pre-distribution in wireless sensor networks. In IEEE international conference on wireless and mobile computing, networking and communication (pp. 532–537).
5.
Zurück zum Zitat Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of 2003 symposium on security and privacy (pp. 197–213, 11–14). Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of 2003 symposium on security and privacy (pp. 197–213, 11–14).
6.
Zurück zum Zitat Du, W., Deng, J., Han, Y. S., Chen, S., & Varshney, P. K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM 2004. Twenty-third AnnualJoint conference of the IEEE computer and communications societies (Vol. 1, pp. -597). Du, W., Deng, J., Han, Y. S., Chen, S., & Varshney, P. K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM 2004. Twenty-third AnnualJoint conference of the IEEE computer and communications societies (Vol. 1, pp. -597).
7.
Zurück zum Zitat Eriksson, J., Krishnamurthy, S. V., & Faloutsos, M. (2006). Truelink: A practical countermeasure to the wormhole attack in wireless networks. In Proceedings of the 2006 14th IEEE international conference on network protocols, 2006. ICNP ’06 (pp. 75–84). Eriksson, J., Krishnamurthy, S. V., & Faloutsos, M. (2006). Truelink: A practical countermeasure to the wormhole attack in wireless networks. In Proceedings of the 2006 14th IEEE international conference on network protocols, 2006. ICNP ’06 (pp. 75–84).
8.
Zurück zum Zitat Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In CCS ’02: Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47), New York, NY, USA, ACM. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In CCS ’02: Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47), New York, NY, USA, ACM.
9.
Zurück zum Zitat Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, 2000 ( Vol. 2, p. 10). Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, 2000 ( Vol. 2, p. 10).
10.
Zurück zum Zitat Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE Societies (Vol. 3, pp. 1976–1986). Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE Societies (Vol. 3, pp. 1976–1986).
11.
Zurück zum Zitat Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks. In Proceedings of the 2007 international conference on wireless communications and mobile computing, IWCMC ’07, (pp. 388–392), New York, NY, USA, 2007. ACM. Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks. In Proceedings of the 2007 international conference on wireless communications and mobile computing, IWCMC ’07, (pp. 388–392), New York, NY, USA, 2007. ACM.
12.
Zurück zum Zitat Karlof, C., Sastry, N., & Wagner, D. (2004). Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04, (pp. 162–175), New York, NY, USA, 2004. ACM. Karlof, C., Sastry, N., & Wagner, D. (2004). Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04, (pp. 162–175), New York, NY, USA, 2004. ACM.
13.
Zurück zum Zitat Karlsson, J., Dooley, L. S., & Pulkkis, G. (2011). A new manet wormhole detection algorithm based on traversal time and hop count analysis. Sensors, 11(12), 11122–11140.CrossRef Karlsson, J., Dooley, L. S., & Pulkkis, G. (2011). A new manet wormhole detection algorithm based on traversal time and hop count analysis. Sensors, 11(12), 11122–11140.CrossRef
14.
Zurück zum Zitat Levis, P., Madden, S., Polastre, J., Szewczyk, R., Woo, A., Gay, D., et al. (2004). Tinyos: An operating system for sensor networks. In in ambient intelligence. Berlin: Springer. Levis, P., Madden, S., Polastre, J., Szewczyk, R., Woo, A., Gay, D., et al. (2004). Tinyos: An operating system for sensor networks. In in ambient intelligence. Berlin: Springer.
15.
Zurück zum Zitat Liu, A., & Ning, P. (2008). Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In International conference on information processing in sensor networks, 2008. IPSN ’08 (pp. 245–256). Liu, A., & Ning, P. (2008). Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In International conference on information processing in sensor networks, 2008. IPSN ’08 (pp. 245–256).
16.
Zurück zum Zitat Liu, D., & Ning, P. (2003). Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, SASN ’03 (pp. 72–82). New York, NY, USA, 2003. ACM. Liu, D., & Ning, P. (2003). Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, SASN ’03 (pp. 72–82). New York, NY, USA, 2003. ACM.
17.
Zurück zum Zitat MacWilliams, F. J., & Sloane, N. J. A. (1988). The theory of error-correcting codes (North-Holland Mathematical Library). North Holland Publishing Company. MacWilliams, F. J., & Sloane, N. J. A. (1988). The theory of error-correcting codes (North-Holland Mathematical Library). North Holland Publishing Company.
18.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking, MobiCom ’00 (pp. 255–265). New York, NY, USA, 2000. ACM. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking, MobiCom ’00 (pp. 255–265). New York, NY, USA, 2000. ACM.
19.
Zurück zum Zitat Panja, B., Madria, S. K., & Bhargava, B. (2006). Energy and communication efficient group key management protocol for hierarchical sensor networks. In IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, 2006 (Vol. 1, p. 8). Panja, B., Madria, S. K., & Bhargava, B. (2006). Energy and communication efficient group key management protocol for hierarchical sensor networks. In IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, 2006 (Vol. 1, p. 8).
20.
Zurück zum Zitat Polastre, J., Hill, J., & Culler, D. (2004). Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04 (pp. 95–107). New York, NY, USA, 2004. ACM. Polastre, J., Hill, J., & Culler, D. (2004). Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04 (pp. 95–107). New York, NY, USA, 2004. ACM.
21.
Zurück zum Zitat Prayati, A., Antonopoulos, Ch., Stoyanova, T., Koulamas, C., & Papadopoulos, G. (2010). A modeling approach on the telosb wsn platform power consumption. Journal of Systems and Software, 83(8), 1355–1363.CrossRef Prayati, A., Antonopoulos, Ch., Stoyanova, T., Koulamas, C., & Papadopoulos, G. (2010). A modeling approach on the telosb wsn platform power consumption. Journal of Systems and Software, 83(8), 1355–1363.CrossRef
22.
Zurück zum Zitat Puttini, Ricardo, Hanashiro, Mara, Miziara, Fbio, de Sousa, Rafael, Javier Garca-Villalba, L., & Barenco, C. J. (2006). On the anomaly intrusion-detection in mobile ad hoc network environments. In Pedro Cuenca & Luiz Orozco-Barbosa (Eds.), Personal wireless communications (Vol. 4217, pp. 182–193)., Lecture notes in computer science Berlin: Springer.CrossRef Puttini, Ricardo, Hanashiro, Mara, Miziara, Fbio, de Sousa, Rafael, Javier Garca-Villalba, L., & Barenco, C. J. (2006). On the anomaly intrusion-detection in mobile ad hoc network environments. In Pedro Cuenca & Luiz Orozco-Barbosa (Eds.), Personal wireless communications (Vol. 4217, pp. 182–193)., Lecture notes in computer science Berlin: Springer.CrossRef
23.
Zurück zum Zitat Riaz, R., Naureen, A., Akram, A., Akbar, A. H., Kim, K.-H., & Ahmed, H. F. (2008). A unified security framework with three key management schemes for wireless sensor networks. Computer Communications, 31(18), 4269–4280. (Secure multi-mode systems and their applications for pervasive computing).CrossRef Riaz, R., Naureen, A., Akram, A., Akbar, A. H., Kim, K.-H., & Ahmed, H. F. (2008). A unified security framework with three key management schemes for wireless sensor networks. Computer Communications, 31(18), 4269–4280. (Secure multi-mode systems and their applications for pervasive computing).CrossRef
24.
Zurück zum Zitat Sen, S., & Clark, J. A. (2011). Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55(15), 3441–3457.CrossRef Sen, S., & Clark, J. A. (2011). Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55(15), 3441–3457.CrossRef
25.
Zurück zum Zitat Shih, E., Cho, S.-H., Ickes, N., Min, R., Sinha, A., Wang, A., & Chandrakasan, A. (2001). Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In Proceedings of the 7th annual international conference on mobile computing and networking, MobiCom ’01 (pp. 272–287). New York, NY, USA, ACM. Shih, E., Cho, S.-H., Ickes, N., Min, R., Sinha, A., Wang, A., & Chandrakasan, A. (2001). Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In Proceedings of the 7th annual international conference on mobile computing and networking, MobiCom ’01 (pp. 272–287). New York, NY, USA, ACM.
27.
Zurück zum Zitat Traynor, P., Kumar, R., Bin Saad, H., Cao, G., & La Porta, T. (2006). Liger: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks. In P. Gunningberg, L. Larzon, M. Satyanarayanan & N. Davies (Eds), ACM/USENIX fourth international conference on mobile systems applications and services (MobiSys) (pp. 15–27). ACM press. Traynor, P., Kumar, R., Bin Saad, H., Cao, G., & La Porta, T. (2006). Liger: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks. In P. Gunningberg, L. Larzon, M. Satyanarayanan & N. Davies (Eds), ACM/USENIX fourth international conference on mobile systems applications and services (MobiSys) (pp. 15–27). ACM press.
28.
Zurück zum Zitat Wang, H., & Li, Q. (2006). Efficient implementation of public key cryptosystems on mote sensors (short paper). In Proceedings of the 8th international conference on information and communications security, ICICS’06 (pp. 519–528). Berlin, Heidelberg, Springer. Wang, H., & Li, Q. (2006). Efficient implementation of public key cryptosystems on mote sensors (short paper). In Proceedings of the 8th international conference on information and communications security, ICICS’06 (pp. 519–528). Berlin, Heidelberg, Springer.
29.
Zurück zum Zitat Wen, M., Zheng, Y.-F., Ye, W.-J., Chen, K.-F., & Qiu, W.-D. (2009). A key management protocol with robust continuity for sensor networks. Computer Standards and Interfaces, 31(4), 642–647.CrossRef Wen, M., Zheng, Y.-F., Ye, W.-J., Chen, K.-F., & Qiu, W.-D. (2009). A key management protocol with robust continuity for sensor networks. Computer Standards and Interfaces, 31(4), 642–647.CrossRef
30.
Zurück zum Zitat Yang, M. L., Al-Anbuky, A., & Liu, W. (2012). A fast and efficient key agreement scheme for wireless sensor networks. In ICWMC 2012, The eighth international conference on wireless and mobile communications (pp. 231–237). Venice: ThinkMind. Yang, M. L., Al-Anbuky, A., & Liu, W. (2012). A fast and efficient key agreement scheme for wireless sensor networks. In ICWMC 2012, The eighth international conference on wireless and mobile communications (pp. 231–237). Venice: ThinkMind.
31.
Zurück zum Zitat Al-Anbuky, A., & Liu, W. (2014). An authenticated key agreement scheme for wireless sensor networks. Journal of Sensor and Actuator Networks, 3(3), 181–206.CrossRef Al-Anbuky, A., & Liu, W. (2014). An authenticated key agreement scheme for wireless sensor networks. Journal of Sensor and Actuator Networks, 3(3), 181–206.CrossRef
32.
Zurück zum Zitat Younis, M. F., Ghumman, K., & Eltoweissy, M. (2006). Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Transactions on Parallel and Distributed Systems, 17(18), 865–882.CrossRef Younis, M. F., Ghumman, K., & Eltoweissy, M. (2006). Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Transactions on Parallel and Distributed Systems, 17(18), 865–882.CrossRef
33.
Zurück zum Zitat Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: efficient security mechanisms for large-scale distributed sensor networks. In CCS ’03: Proceedings of the 10th ACM conference on computer and communications security (pp. 62–72). New York, NY, USA, ACM. Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: efficient security mechanisms for large-scale distributed sensor networks. In CCS ’03: Proceedings of the 10th ACM conference on computer and communications security (pp. 62–72). New York, NY, USA, ACM.
34.
Zurück zum Zitat Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE international conference on network protocols, ICNP ’03 (p. 326) Washington, DC, USA, IEEE Computer Society. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE international conference on network protocols, ICNP ’03 (p. 326) Washington, DC, USA, IEEE Computer Society.
Metadaten
Titel
An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network
verfasst von
Musfiq Rahman
Srinivas Sampalli
Publikationsdatum
01.10.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2546-4

Weitere Artikel der Ausgabe 3/2015

Wireless Personal Communications 3/2015 Zur Ausgabe

Neuer Inhalt