Skip to main content
Erschienen in: Wireless Personal Communications 4/2020

21.01.2020

A Novel Method for Key Establishment Based on Symmetric Cryptography in Hierarchical Wireless Sensor Networks

verfasst von: Hamid Mirvaziri, Rahim Hosseini

Erschienen in: Wireless Personal Communications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most of recent researches carried out into wireless sensor networks are concerned with homogeneous networks in which all network nodes have the same features and key management mechanisms presented for them aim to enable as many nodes to establish shared cryptographic keys as possible. Hierarchical networks have shown a better performance because of using clustering features. This issue motivated us to present a method for key establishment in hierarchical wireless sensor networks based on symmetric cryptography. Since symmetric cryptosystems consume to have low energy, they are a good choice for sensor networks. Although symmetric cryptosystems consume to have high memory, this shortcoming can be diminished by appropriate techniques. The simulation results have shown that our proposed method can significantly reduce the memory consumption resulted from saving keys alongside reducing the energy consumption resulted from communications in all network nodes than related works while it presents a favorable level of security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Daemen, J., & Rijmen, V. (2002). The Design of Rijndael, AES—The Advanced Encryption Standard (p. 238). Springer. Daemen, J., & Rijmen, V. (2002). The Design of Rijndael, AES—The Advanced Encryption Standard (p. 238). Springer.
5.
Zurück zum Zitat Mungara, R., VenkateswaraRao, K., & Pallamreddy, V. A. Routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. Mungara, R., VenkateswaraRao, K., & Pallamreddy, V. A. Routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks.
6.
Zurück zum Zitat Yarvis, M., Kushalnagar, N., Singh, H., Rangarajan, A., Liu, Y., & Singh, S. (2005). Exploiting heterogeneity in sensor networks. In IEEE infocom (Vol. 2, p. 878). Institute of Electrical Engineers Inc (IEEE). Yarvis, M., Kushalnagar, N., Singh, H., Rangarajan, A., Liu, Y., & Singh, S. (2005). Exploiting heterogeneity in sensor networks. In IEEE infocom (Vol. 2, p. 878). Institute of Electrical Engineers Inc (IEEE).
7.
Zurück zum Zitat Girod, L., Stathopoulos, T., Ramanathan, N., Elson, J., Estrin, D., Osterweil, E., et al. (2004). A system for simulation, emulation, and deployment of heterogeneous sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 201–213). ACM. https://doi.org/10.1145/1031495.1031519. Girod, L., Stathopoulos, T., Ramanathan, N., Elson, J., Estrin, D., Osterweil, E., et al. (2004). A system for simulation, emulation, and deployment of heterogeneous sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems (pp. 201–213). ACM. https://​doi.​org/​10.​1145/​1031495.​1031519.
8.
Zurück zum Zitat Lai, B., Kim, S., & Verbauwhede, I. (2002). Scalable session key construction protocol for wireless sensor networks. In Proceedings of the IEEE Workshop on Large Scale Real Time and Embedded Systems (LARTES), Washington, DC, USA, December 2002, p. 7. Lai, B., Kim, S., & Verbauwhede, I. (2002). Scalable session key construction protocol for wireless sensor networks. In Proceedings of the IEEE Workshop on Large Scale Real Time and Embedded Systems (LARTES), Washington, DC, USA, December 2002, p. 7.
9.
Zurück zum Zitat Nemec, L., Matyas, V., Ostadal, R., Svenda, P., & Palant, P. L. (2019). Evaluating dynamic approaches to key (Re-) Establishment in wireless sensor networks. Sensors,19(4), 914.CrossRef Nemec, L., Matyas, V., Ostadal, R., Svenda, P., & Palant, P. L. (2019). Evaluating dynamic approaches to key (Re-) Establishment in wireless sensor networks. Sensors,19(4), 914.CrossRef
10.
Zurück zum Zitat Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of the 2003 Symposium on Security and Privacy, Berkeley, CA, USA, 11–14 May 2003, pp. 197–213. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of the 2003 Symposium on Security and Privacy, Berkeley, CA, USA, 11–14 May 2003, pp. 197–213.
11.
Zurück zum Zitat Álvarez Bermejo, J. A., Lodroman, A., & López-Ramos, J. A. (2016). Distributed key agreement for group communications based on elliptic curves. An application to sensor networks. Mathematical Methods in the Applied Sciences,39, 4797–4809.MathSciNetCrossRef Álvarez Bermejo, J. A., Lodroman, A., & López-Ramos, J. A. (2016). Distributed key agreement for group communications based on elliptic curves. An application to sensor networks. Mathematical Methods in the Applied Sciences,39, 4797–4809.MathSciNetCrossRef
12.
Zurück zum Zitat Parrilla, L., Castillo, E., López-Ramos, J. A., Álvarez Bermejo, J. A., García, A., & Morales, D. P. (2018). Unified compact ECC-AES co-processor with group-key support for IoT devices in wireless sensor networks. Sensors,18, 251.CrossRef Parrilla, L., Castillo, E., López-Ramos, J. A., Álvarez Bermejo, J. A., García, A., & Morales, D. P. (2018). Unified compact ECC-AES co-processor with group-key support for IoT devices in wireless sensor networks. Sensors,18, 251.CrossRef
15.
Zurück zum Zitat Boujelben, M., Youssef, H., Mzid, R., & Abid, M. (2011). IKM—An identity based key management scheme for heterogeneous sensor networks. JCM,6(2), 185–197.CrossRef Boujelben, M., Youssef, H., Mzid, R., & Abid, M. (2011). IKM—An identity based key management scheme for heterogeneous sensor networks. JCM,6(2), 185–197.CrossRef
18.
Zurück zum Zitat Kaur, A. (2013). Energy analysis of wireless sensor networks using rsa and ecc encryption method. International Journal of Scientific & Engineering Research,4(5), 2212. Kaur, A. (2013). Energy analysis of wireless sensor networks using rsa and ecc encryption method. International Journal of Scientific & Engineering Research,4(5), 2212.
19.
25.
Zurück zum Zitat Fanian, A., Berenjkoub, M., Saidi, H., & Gulliver, T. A. (2010). A new key establishment protocol for limited resource wireless sensor networks. In 2010 8th annual communication networks and services research conference (pp. 138–145). IEEE. https://doi.org/10.1109/CNSR.2010.43. Fanian, A., Berenjkoub, M., Saidi, H., & Gulliver, T. A. (2010). A new key establishment protocol for limited resource wireless sensor networks. In 2010 8th annual communication networks and services research conference (pp. 138–145). IEEE. https://​doi.​org/​10.​1109/​CNSR.​2010.​43.
27.
Zurück zum Zitat Joan, D., & Vincent, R. (2002). The design of Rijndael: AES-the advanced encryption standard. In Information Security and Cryptography. Springer. Joan, D., & Vincent, R. (2002). The design of Rijndael: AES-the advanced encryption standard. In Information Security and Cryptography. Springer.
28.
Zurück zum Zitat Singh, R., Misra, R., & Kumar, V. (2013). Analysis the impact of symmetric cryptographic algorithms on power consumption for various data types. International Journal on Recent and Innovation Trends in Computing and Communication,1(4), 321–326. Singh, R., Misra, R., & Kumar, V. (2013). Analysis the impact of symmetric cryptographic algorithms on power consumption for various data types. International Journal on Recent and Innovation Trends in Computing and Communication,1(4), 321–326.
37.
Zurück zum Zitat Lai, B., Kim, S., & Verbauwhede, I. (2002). Scalable session key construction protocol for wireless sensor networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES) (Vol. 7). Lai, B., Kim, S., & Verbauwhede, I. (2002). Scalable session key construction protocol for wireless sensor networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES) (Vol. 7).
40.
Zurück zum Zitat Dutertre, B., Cheung, S., & Levy, J. (2004). Lightweight key management in wireless sensor networks by leveraging initial trust (pp. 1–18). Technical Report SRI-SDL-04-02, SRI International. Dutertre, B., Cheung, S., & Levy, J. (2004). Lightweight key management in wireless sensor networks by leveraging initial trust (pp. 1–18). Technical Report SRI-SDL-04-02, SRI International.
42.
Zurück zum Zitat Mungara, R., VenkateswaraRao, K., & Pallamreddy, V. A. (2009). Routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Transactions on Wireless Communications,8(3), 371–383. Mungara, R., VenkateswaraRao, K., & Pallamreddy, V. A. (2009). Routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Transactions on Wireless Communications,8(3), 371–383.
Metadaten
Titel
A Novel Method for Key Establishment Based on Symmetric Cryptography in Hierarchical Wireless Sensor Networks
verfasst von
Hamid Mirvaziri
Rahim Hosseini
Publikationsdatum
21.01.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07155-y

Weitere Artikel der Ausgabe 4/2020

Wireless Personal Communications 4/2020 Zur Ausgabe

Neuer Inhalt