Skip to main content
Erschienen in: Wireless Personal Communications 2/2016

01.03.2016

Mobility Based Key Management Security Scheme for Wireless Sensor Networks

verfasst von: T. Lalitha, S. Jayaprabha

Erschienen in: Wireless Personal Communications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In wireless sensor networks (WSNs) handling mobility of nodes in key management is a challenging task. In this paper, a mobility management technique for keying scheme of WSNs is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pairwise keys for nodes are generated by the sink through exclusion basis systems. Whenever a node moves from currently connected cluster to another in the network, the mobility based key management scheme is triggered. The sink verifies the authenticity of roaming node and allocates it to a nearby cluster. New pairwise keys are generated and transmitted to the roaming node through newly connected cluster head. Further, a key organization technique is presented to ensure the forward and backward secrecy of nodes. The proposed technique is simulated in NS2 and simulation results show the efficiency of our technique.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat de Brito, L. M. P. L., & Peralta, L. M. R. (2008). An analysis of localization problems and solutions in wireless sensor networks. Polytechnical Studies Review, 6(9), 1–27. de Brito, L. M. P. L., & Peralta, L. M. R. (2008). An analysis of localization problems and solutions in wireless sensor networks. Polytechnical Studies Review, 6(9), 1–27.
2.
Zurück zum Zitat Lee, H., & Aghajan, H. (2005). Collaborative self-localization techniques for wireless image sensor networks. In Proceedings of the asilomar conference on signals, systems and computer s. Lee, H., & Aghajan, H. (2005). Collaborative self-localization techniques for wireless image sensor networks. In Proceedings of the asilomar conference on signals, systems and computer s.
3.
Zurück zum Zitat Abuhelaleh, M. A., & Elleithy, K. M. (2010). Security in wireless sensor networks: Key management module in SOOAWSN. International Journal of Network Security & Its Applications (IJNSA), 4, 67–78.CrossRef Abuhelaleh, M. A., & Elleithy, K. M. (2010). Security in wireless sensor networks: Key management module in SOOAWSN. International Journal of Network Security & Its Applications (IJNSA), 4, 67–78.CrossRef
4.
Zurück zum Zitat Lalitha, T. (2012). Energy efficient cluster based key management & authentication technique for wireless sensor networks. European Journal of Scientific Research, 76(3), 403–410. Lalitha, T. (2012). Energy efficient cluster based key management & authentication technique for wireless sensor networks. European Journal of Scientific Research, 76(3), 403–410.
5.
Zurück zum Zitat Jeong, Y. S., & Lee, S. H. (2006). Secure key management protocol in the wireless sensor network. Inter J. Inform. Proc. Syst. 2. Jeong, Y. S., & Lee, S. H. (2006). Secure key management protocol in the wireless sensor network. Inter J. Inform. Proc. Syst. 2.
6.
Zurück zum Zitat Dwoskin, J., Xu, D., Huang, J., Chiang, M., & Lee, R. (2007). Secure key management architecture against sensor-node fabrication attacks. In Proceedings of the IEEE global telecommunications confe rence, Nov. 26–30 (pp. 166–171). Washington, DC: IEEE Xplore Press. doi:10.1109/GLOCOM.2007.39 Dwoskin, J., Xu, D., Huang, J., Chiang, M., & Lee, R. (2007). Secure key management architecture against sensor-node fabrication attacks. In Proceedings of the IEEE global telecommunications confe rence, Nov. 26–30 (pp. 166–171). Washington, DC: IEEE Xplore Press. doi:10.​1109/​GLOCOM.​2007.​39
7.
Zurück zum Zitat Jain, Y. K., & Jain, V. (2011). An efficient key management scheme for wireless network. International Journal of Scientific and Engineering, 2(2), 1–7. Jain, Y. K., & Jain, V. (2011). An efficient key management scheme for wireless network. International Journal of Scientific and Engineering, 2(2), 1–7.
8.
Zurück zum Zitat Maala, B., Bettahar, H., & Bouabdallah, A. (2008). Performances of key management schemes in wireless sensor networks. Singapore: World Scientific Rev. Maala, B., Bettahar, H., & Bouabdallah, A. (2008). Performances of key management schemes in wireless sensor networks. Singapore: World Scientific Rev.
9.
Zurück zum Zitat Shen, L., & Shi, X. (2008). A dynamic cluster-based key management protocol in wireless sensor networks. International Journal of Intelligent Control and Systems, 13, 146–151. Shen, L., & Shi, X. (2008). A dynamic cluster-based key management protocol in wireless sensor networks. International Journal of Intelligent Control and Systems, 13, 146–151.
10.
Zurück zum Zitat Kim, Y. H., Lee, H., & Lee, D. H. (2007). A secure and efficient key management scheme for wireless sensor networks. In Third International Conference on Security and Privacy in Communications Networks and the Workshops, Sept. 17–21 (pp. 162–167). Nice, France: IEEE Xplore Press. doi:10.1109/SECCOM.2007.4550324 Kim, Y. H., Lee, H., & Lee, D. H. (2007). A secure and efficient key management scheme for wireless sensor networks. In Third International Conference on Security and Privacy in Communications Networks and the Workshops, Sept. 17–21 (pp. 162–167). Nice, France: IEEE Xplore Press. doi:10.​1109/​SECCOM.​2007.​4550324
11.
Zurück zum Zitat Shaikh, R. A., Jameel, H., Auriol, B. J., Lee, H., Lee, S., & Song et al., Y. J. (2010). Achieving network level privacy in wireless sensor networks. Sensors, 10(3), 1447–1472. Shaikh, R. A., Jameel, H., Auriol, B. J., Lee, H., Lee, S., & Song et al., Y. J. (2010). Achieving network level privacy in wireless sensor networks. Sensors, 10(3), 1447–1472.
Metadaten
Titel
Mobility Based Key Management Security Scheme for Wireless Sensor Networks
verfasst von
T. Lalitha
S. Jayaprabha
Publikationsdatum
01.03.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2872-6

Weitere Artikel der Ausgabe 2/2016

Wireless Personal Communications 2/2016 Zur Ausgabe