Skip to main content
Erschienen in: Wireless Personal Communications 4/2015

01.08.2015

LKH++ Based Group Key Management Scheme for Wireless Sensor Network

verfasst von: Wenbin Yao, Si Han, Xiaoyong Li

Erschienen in: Wireless Personal Communications | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper proposes a secure low-power group key management scheme based on LKH++. In our scheme, we construct a secure tree to manage group keys. The building method of key tree and holding way of keys are proposed by our scheme to reduce computation and storage overhead on each sensor node. In addition, WLKH supports rekeying to enhance network security and survivability against node capture. Performance analysis shows WLKH is highly efficient in term of security, computation and key storage.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.CrossRef Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.CrossRef
2.
Zurück zum Zitat Sha, K., Gehlot, J., & Greve, R. (2013). Multipath routing techniques in wireless sensor networks: A survey. Wireless Personal Communications, 70(2), 807–829.CrossRef Sha, K., Gehlot, J., & Greve, R. (2013). Multipath routing techniques in wireless sensor networks: A survey. Wireless Personal Communications, 70(2), 807–829.CrossRef
3.
Zurück zum Zitat Liu, Y., Zhang, Q., & Ni, L. M. (2010). Opportunity-based topology control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 21(3), 405–416.CrossRef Liu, Y., Zhang, Q., & Ni, L. M. (2010). Opportunity-based topology control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 21(3), 405–416.CrossRef
4.
Zurück zum Zitat Aslam, N., Robertson, W., & Phillips, W. (2009). Algorithms for relay node selection in randomly deployed homogeneous cluster-based wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 8(1), 5–20. Aslam, N., Robertson, W., & Phillips, W. (2009). Algorithms for relay node selection in randomly deployed homogeneous cluster-based wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 8(1), 5–20.
5.
Zurück zum Zitat Ding, G., Wang, J., & Wu, Q. (2013). Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate. IEEE Sensors Journal, 13(11), 4247–4255.CrossRef Ding, G., Wang, J., & Wu, Q. (2013). Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate. IEEE Sensors Journal, 13(11), 4247–4255.CrossRef
6.
Zurück zum Zitat Viani, F., Robol, F., & Polo, A. (2013). Wireless architectures for heterogeneous sensing in smart home applications: Concepts and real implementation. Proceedings of IEEE, 101(11), 1–16.CrossRef Viani, F., Robol, F., & Polo, A. (2013). Wireless architectures for heterogeneous sensing in smart home applications: Concepts and real implementation. Proceedings of IEEE, 101(11), 1–16.CrossRef
7.
Zurück zum Zitat Zois, D. S., Levorato, M., & Mitra, U. (2013). Energy-efficient, heterogeneous sensor selection for physical activity detection in wireless body area networks. IEEE Transactions on Signal Processing, 61(5–8), 1581–1594.MathSciNetCrossRef Zois, D. S., Levorato, M., & Mitra, U. (2013). Energy-efficient, heterogeneous sensor selection for physical activity detection in wireless body area networks. IEEE Transactions on Signal Processing, 61(5–8), 1581–1594.MathSciNetCrossRef
8.
Zurück zum Zitat Alonso, R. S., Tapia, D. I., & Bajo, J. (2013). Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks, 11(1), 151–166.CrossRef Alonso, R. S., Tapia, D. I., & Bajo, J. (2013). Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks, 11(1), 151–166.CrossRef
9.
Zurück zum Zitat Khedr, A. M., & Osamy, W. (2011). Minimum perimeter coverage of query regions in a heterogeneous wireless sensor network. Information Sciences, 181(15), 3130–3142.CrossRef Khedr, A. M., & Osamy, W. (2011). Minimum perimeter coverage of query regions in a heterogeneous wireless sensor network. Information Sciences, 181(15), 3130–3142.CrossRef
10.
Zurück zum Zitat Yoo, S. J., Lee, D. H., & Yang, H. S. (2013). A novel secure scheme for wireless Ad Hoc network. Wireless Personal Communications, 73(2), 197–205.CrossRef Yoo, S. J., Lee, D. H., & Yang, H. S. (2013). A novel secure scheme for wireless Ad Hoc network. Wireless Personal Communications, 73(2), 197–205.CrossRef
11.
Zurück zum Zitat Chen, C. M., Zheng, X., & Wu, T. Y. (2014). A complete hierarchical key management scheme for heterogeneous wireless sensor networks. The Scientific World Journal, 2014. Chen, C. M., Zheng, X., & Wu, T. Y. (2014). A complete hierarchical key management scheme for heterogeneous wireless sensor networks. The Scientific World Journal, 2014.
12.
Zurück zum Zitat Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks, In IWCMC ’07 Proceedings of the 2007 international conference on wireless communications and mobile computing, 388–392. Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks, In IWCMC ’07 Proceedings of the 2007 international conference on wireless communications and mobile computing, 388–392.
13.
Zurück zum Zitat Brown, J., Du, X., & Nygrad, K. (2007). An efficient public-key-based heterogeneous sensor network key distribution scheme. Ad Hoc Networks, 5(1), 24–34.CrossRef Brown, J., Du, X., & Nygrad, K. (2007). An efficient public-key-based heterogeneous sensor network key distribution scheme. Ad Hoc Networks, 5(1), 24–34.CrossRef
14.
Zurück zum Zitat Traynor, P., Kumar, R., & Choi, H. (2007). Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing, 6(6), 663–677.CrossRef Traynor, P., Kumar, R., & Choi, H. (2007). Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing, 6(6), 663–677.CrossRef
15.
Zurück zum Zitat Zhang, W., Zhu, S., & Cao, G. (2009). Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks, 7(6), 1229–1242.CrossRef Zhang, W., Zhu, S., & Cao, G. (2009). Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks, 7(6), 1229–1242.CrossRef
16.
Zurück zum Zitat Banihashemian, S., Bafghi, A. G., & Moghaddam, M. H. Y. (2011). Centralized key management scheme in wireless sensor networks. Wireless Personal Communications, 60(3), 463–474.CrossRef Banihashemian, S., Bafghi, A. G., & Moghaddam, M. H. Y. (2011). Centralized key management scheme in wireless sensor networks. Wireless Personal Communications, 60(3), 463–474.CrossRef
17.
Zurück zum Zitat Zhang, X., He, J., & Wei, Q. (2011). EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011, 12.CrossRef Zhang, X., He, J., & Wei, Q. (2011). EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011, 12.CrossRef
18.
Zurück zum Zitat Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2013) A low-energy key management protocol for wireless sensor networks, Eighth IEEE symposium on computers and communications, 335–340(2013). Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2013) A low-energy key management protocol for wireless sensor networks, Eighth IEEE symposium on computers and communications, 335–340(2013).
19.
Zurück zum Zitat Ya-nan, L., Jian, W., & He, D. (2008). Intra-cluster key sharing in hierarchical sensor networks. IET Wireless Sensor Systems, 3(3), 172–182.CrossRef Ya-nan, L., Jian, W., & He, D. (2008). Intra-cluster key sharing in hierarchical sensor networks. IET Wireless Sensor Systems, 3(3), 172–182.CrossRef
21.
Zurück zum Zitat Seo, S. H., Won, J., & Sultana, S. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.CrossRef Seo, S. H., Won, J., & Sultana, S. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.CrossRef
22.
Zurück zum Zitat Di Pietro, R., Mancini, L. V., & Jajodia, S. (2002). Efficient and secure keys management for wireless mobile communications. In Proceedings of the second ACM international workshop on principles of mobile computing. 2002, 66–73. Di Pietro, R., Mancini, L. V., & Jajodia, S. (2002). Efficient and secure keys management for wireless mobile communications. In Proceedings of the second ACM international workshop on principles of mobile computing. 2002, 66–73.
23.
Zurück zum Zitat Karaboga, D., Okdem, S., & Ozturk, C. (2012). Cluster based wireless sensor network routing using artilcial bee colony algorithm. Wireless Networks, 18(7), 847–860.CrossRef Karaboga, D., Okdem, S., & Ozturk, C. (2012). Cluster based wireless sensor network routing using artilcial bee colony algorithm. Wireless Networks, 18(7), 847–860.CrossRef
24.
Zurück zum Zitat Kellokoski, J., & Koskinen, J. (2014). Always best connected heterogeneous network concept. Wireless Personal Communications, 75(1), 63–80.CrossRef Kellokoski, J., & Koskinen, J. (2014). Always best connected heterogeneous network concept. Wireless Personal Communications, 75(1), 63–80.CrossRef
Metadaten
Titel
LKH++ Based Group Key Management Scheme for Wireless Sensor Network
verfasst von
Wenbin Yao
Si Han
Xiaoyong Li
Publikationsdatum
01.08.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2582-0

Weitere Artikel der Ausgabe 4/2015

Wireless Personal Communications 4/2015 Zur Ausgabe

Neuer Inhalt