Skip to main content
Erschienen in: Annals of Telecommunications 1-2/2010

01.02.2010

MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks

verfasst von: Muhammad Khaliq-ur-Rahman Raazi Syed, Heejo Lee, Sungyoung Lee, Young-Koo Lee

Erschienen in: Annals of Telecommunications | Ausgabe 1-2/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks (WSN) are susceptible to node capture and many network levels attacks. In order to provide protection against such threats, WSNs require lightweight and scalable key management schemes because the nodes are resource-constrained and high in number. Also, the effect of node compromise should be minimized and node capture should not hamper the normal working of a network. In this paper, we present an exclusion basis system-based key management scheme called MUQAMI+ for large-scale clustered sensor networks. We have distributed the responsibility of key management to multiple nodes within clusters, avoiding single points of failure and getting rid of costly inter-cluster communication. Our scheme is scalable and highly efficient in terms of re-keying and compromised node revocation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
In the conference version, we named this protocol MUQAMI. Since it is much improved in this journal version, we have named it MUQAMI+.
 
Literatur
1.
2.
Zurück zum Zitat Youssef A, Agrawala A, Younis M (2005) Accurate anchor-free localization in wireless sensor networks. In: First IEEE workshop information assurance in wireless sensor networks (WSNIA ’05) Youssef A, Agrawala A, Younis M (2005) Accurate anchor-free localization in wireless sensor networks. In: First IEEE workshop information assurance in wireless sensor networks (WSNIA ’05)
3.
Zurück zum Zitat Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Networks 38(4):393–422CrossRef Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Networks 38(4):393–422CrossRef
4.
Zurück zum Zitat Amin S, Siddiqui M, Hong C (2008) Detecting jamming attacks in ubiquitous sensor networks. In: IEEE sensors applications symposium 2008, pp 40–45 Amin S, Siddiqui M, Hong C (2008) Detecting jamming attacks in ubiquitous sensor networks. In: IEEE sensors applications symposium 2008, pp 40–45
6.
Zurück zum Zitat Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: SP ’03: proceedings of the 2003 IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC, p 197 Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: SP ’03: proceedings of the 2003 IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC, p 197
7.
Zurück zum Zitat Dierks T, Allen C (1999) The TLS protocol version 1.0 Dierks T, Allen C (1999) The TLS protocol version 1.0
8.
Zurück zum Zitat Dini G, Savino IM (2006) An efficient key revocation protocol for wireless sensor networks. In: WOWMOM ’06: proceedings of the 2006 international symposium on on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, DC, pp 450–452. doi:10.1109/WOWMOM.2006.23 CrossRef Dini G, Savino IM (2006) An efficient key revocation protocol for wireless sensor networks. In: WOWMOM ’06: proceedings of the 2006 international symposium on on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, DC, pp 450–452. doi:10.​1109/​WOWMOM.​2006.​23 CrossRef
9.
Zurück zum Zitat Du W, Deng J, Han YS, Varshney PK (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS ’03: proceedings of the 10th ACM conference on computer and communications security. ACM, New York, pp 42–51. doi:10.1145/948109.948118 CrossRef Du W, Deng J, Han YS, Varshney PK (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS ’03: proceedings of the 10th ACM conference on computer and communications security. ACM, New York, pp 42–51. doi:10.​1145/​948109.​948118 CrossRef
12.
Zurück zum Zitat Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: CCS ’02: proceedings of the 9th ACM conference on computer and communications security. ACM, New York, pp 41–47. doi:10.1145/586110.586117 CrossRef Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: CCS ’02: proceedings of the 9th ACM conference on computer and communications security. ACM, New York, pp 41–47. doi:10.​1145/​586110.​586117 CrossRef
13.
Zurück zum Zitat Ghumman K (2006) Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Trans Parallel Distrib Syst 17(8):865–882. doi:10.1109/TPDS.2006.106 (Senior Member-Mohamed F. Younis and Senior Member-Mohamed Eltoweissy)CrossRef Ghumman K (2006) Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Trans Parallel Distrib Syst 17(8):865–882. doi:10.​1109/​TPDS.​2006.​106 (Senior Member-Mohamed F. Younis and Senior Member-Mohamed Eltoweissy)CrossRef
14.
Zurück zum Zitat Gupta G, Younis M (2003) Load-balanced clustering of wireless sensor networks. In: International conference on communications (ICC ’03), pp 1848–1852 Gupta G, Younis M (2003) Load-balanced clustering of wireless sensor networks. In: International conference on communications (ICC ’03), pp 1848–1852
15.
Zurück zum Zitat Intanagonwiwat C, Govindan R, Estrin D (2000) Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: ACM mobile computing and networking (Mobicom’00), pp 56–67 Intanagonwiwat C, Govindan R, Estrin D (2000) Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: ACM mobile computing and networking (Mobicom’00), pp 56–67
16.
Zurück zum Zitat Karlof C, Li Y, Polastre J (2003) Arrive: an architecture for robust routing in volatile environments. Tech. Rep. CSD-03-1233, University of California at Berkeley Karlof C, Li Y, Polastre J (2003) Arrive: an architecture for robust routing in volatile environments. Tech. Rep. CSD-03-1233, University of California at Berkeley
17.
Zurück zum Zitat Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: SenSys ’04: proceedings of the 2nd international conference on embedded networked sensor systems. ACM, New York, pp 162–175. doi:10.1145/1031495.1031515 CrossRef Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: SenSys ’04: proceedings of the 2nd international conference on embedded networked sensor systems. ACM, New York, pp 162–175. doi:10.​1145/​1031495.​1031515 CrossRef
18.
Zurück zum Zitat Kohl J, Neuman C (1993) The Kerberos network authentication service (v5) Kohl J, Neuman C (1993) The Kerberos network authentication service (v5)
20.
Zurück zum Zitat Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Networks 43(4):499–518MATHCrossRef Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Networks 43(4):499–518MATHCrossRef
21.
Zurück zum Zitat Li G, He J, Fu Y (2006) A hexagon-based key predistribution scheme in sensor networks. In: ICPPW ’06: proceedings of the 2006 international conference workshops on parallel processing. IEEE Computer Society, Washington, DC, pp 175–180. doi:10.1109/ICPPW.2006.9 Li G, He J, Fu Y (2006) A hexagon-based key predistribution scheme in sensor networks. In: ICPPW ’06: proceedings of the 2006 international conference workshops on parallel processing. IEEE Computer Society, Washington, DC, pp 175–180. doi:10.​1109/​ICPPW.​2006.​9
22.
Zurück zum Zitat Madden S, Szewczyk R, Franklin MJ, Culler D (2002) Supporting aggregate queries over ad-hoc wireless sensor networks. In: WMCSA ’02: proceedings of the fourth IEEE workshop on mobile computing systems and applications. IEEE Computer Society, Washington, DC, p 49CrossRef Madden S, Szewczyk R, Franklin MJ, Culler D (2002) Supporting aggregate queries over ad-hoc wireless sensor networks. In: WMCSA ’02: proceedings of the fourth IEEE workshop on mobile computing systems and applications. IEEE Computer Society, Washington, DC, p 49CrossRef
23.
Zurück zum Zitat Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton
24.
Zurück zum Zitat Paek KJ, Kim J, Hwang CS, Song US (2007) An energy-efficient key management protocol for large-scale wireless sensor networks. In: MUE ’07: proceedings of the 2007 international conference on multimedia and ubiquitous engineering. IEEE Computer Society, Washington, DC, pp 201–206. doi:10.1109/MUE.2007.74 CrossRef Paek KJ, Kim J, Hwang CS, Song US (2007) An energy-efficient key management protocol for large-scale wireless sensor networks. In: MUE ’07: proceedings of the 2007 international conference on multimedia and ubiquitous engineering. IEEE Computer Society, Washington, DC, pp 201–206. doi:10.​1109/​MUE.​2007.​74 CrossRef
25.
Zurück zum Zitat Seetharam D, Rhee S (2004) An efficient pseudo random number generator for low-power sensor networks. In: LCN ’04: proceedings of the 29th annual IEEE international conference on local computer networks. IEEE Computer Society, Washington, DC, pp 560–562. doi:10.1109/LCN.2004.18 CrossRef Seetharam D, Rhee S (2004) An efficient pseudo random number generator for low-power sensor networks. In: LCN ’04: proceedings of the 29th annual IEEE international conference on local computer networks. IEEE Computer Society, Washington, DC, pp 560–562. doi:10.​1109/​LCN.​2004.​18 CrossRef
26.
Zurück zum Zitat Shaikh R, Lee S, Khan M, Song Y (2006) LSec: lightweight security protocol for distributed wireless sensor networks. In: 11th IFIP international conference on personal wireless communications PWC’06. LNCS, vol 4217, Spain, pp 367–377 Shaikh R, Lee S, Khan M, Song Y (2006) LSec: lightweight security protocol for distributed wireless sensor networks. In: 11th IFIP international conference on personal wireless communications PWC’06. LNCS, vol 4217, Spain, pp 367–377
27.
Zurück zum Zitat Tilak S, Abu-Ghazaleh N, Heinzelman W (2002) A taxonomy of wireless microsensor network models. ACM Mobile Comput Commun 6(2):1–8CrossRef Tilak S, Abu-Ghazaleh N, Heinzelman W (2002) A taxonomy of wireless microsensor network models. ACM Mobile Comput Commun 6(2):1–8CrossRef
28.
Zurück zum Zitat Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In: CASES ’03: proceedings of the 2003 international conference on compilers, architecture and synthesis for embedded systems. ACM, New York, pp 188–197. doi:10.1145/951710.951737 Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In: CASES ’03: proceedings of the 2003 international conference on compilers, architecture and synthesis for embedded systems. ACM, New York, pp 188–197. doi:10.​1145/​951710.​951737
29.
Zurück zum Zitat Xing G, Lu C, Zhang Y, Huang Q, Pless R (2005) Minimum power configuration in wireless sensor networks. In: MobiHoc ’05: proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 390–401. doi:10.1145/1062689.1062738 CrossRef Xing G, Lu C, Zhang Y, Huang Q, Pless R (2005) Minimum power configuration in wireless sensor networks. In: MobiHoc ’05: proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 390–401. doi:10.​1145/​1062689.​1062738 CrossRef
Metadaten
Titel
MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks
verfasst von
Muhammad Khaliq-ur-Rahman Raazi Syed
Heejo Lee
Sungyoung Lee
Young-Koo Lee
Publikationsdatum
01.02.2010
Verlag
Springer-Verlag
Erschienen in
Annals of Telecommunications / Ausgabe 1-2/2010
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-009-0123-0

Weitere Artikel der Ausgabe 1-2/2010

Annals of Telecommunications 1-2/2010 Zur Ausgabe

Acknowledgments

2009 reviewers list