Skip to main content

2017 | OriginalPaper | Buchkapitel

Secure Distributed Group Rekeying Scheme for Cluster Based Wireless Sensor Networks Using Multilevel Encryption

verfasst von : Mohsen Yazdinejad, Faezeh Nayyeri, Omid Mahdi Ebadati E., Nasim Afshari

Erschienen in: Internet of Things: Novel Advances and Envisioned Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently evolution in various devices, aid unrealistic dreams of connection between them and people on a large scale comes true and accelerates the idea of the Internet of Things (IoT). Sensors are playing an important role in this way. Conversely wireless sensor networks take the advantages to build a bridge and become an edge for IoT. By enhancing the usage of wireless sensor networks in many fields such as military, having a secure environment for communication within sensors is becoming more obligatory. Wireless sensor networks can be affected by active or passive attacks. One of the important concerns to reach to the aim of the IoT after deploying WSNs is its security. In this chapter, a model that is dealing with a variety of passive attacks, including node capturing and eavesdropping, which make data to be eliminated or changed is proposed. Due to the resource constrained of WSNs, secured schemes that use in ad hoc and wired networks are not appropriate. Additionally, to ensure environmental security and reduce usage of limited resources of sensors, a novel scheme using dynamic key management and encrypted data security is proposed. In order to prevent invader’s access to encrypted data, generating a new key during re-keying model is developed. For this purpose, a random number is sent as a pattern instead of regular sending a new key to a group of sensors for encryption. Index of an array, which is pre-distributed among sensors is determined through location of 1’s in the binary representation of the pattern, involve keys, which used in encryption or decryption. The results show that the complexity of time is \(O(K*N)\), where K is the size of the array, which its keys use in encryption or decryption, and N is the length of the text that should be encrypted or decrypted. Furthermore, by paying more time linearly the security of the network is increased exponentially for the larger scales of networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sabzinejad Farash, M., Turkanovic, M., Kumari, S., Holbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36(1), 152–176 (2016) Sabzinejad Farash, M., Turkanovic, M., Kumari, S., Holbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36(1), 152–176 (2016)
2.
Zurück zum Zitat Tague, P., Poovendran, R.: Modeling node capture attacks in wireless sensor networks. In: Proceedings of 46th Annual Allerton Conference on Communication, Control, and Computing, vol. 3, pp. 205–209 (2008) Tague, P., Poovendran, R.: Modeling node capture attacks in wireless sensor networks. In: Proceedings of 46th Annual Allerton Conference on Communication, Control, and Computing, vol. 3, pp. 205–209 (2008)
3.
Zurück zum Zitat Padmavathi, D.G., Shanmugapriya, M.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Technical Report on arXiv, preprint arXiv:0909.0576 (2009) Padmavathi, D.G., Shanmugapriya, M.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Technical Report on arXiv, preprint arXiv:​0909.​0576 (2009)
4.
Zurück zum Zitat Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: Proceedings of 49th IEEE Conference on Decision and Control, vol. 4, pp. 67–72 (2010) Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: Proceedings of 49th IEEE Conference on Decision and Control, vol. 4, pp. 67–72 (2010)
5.
Zurück zum Zitat Masdari, M.S., Bidaki, M.: Analysis of secure LEACH-based clustering protocols in wireless sensor networks. Wirel. Netw. 9(3), 345–358 (2013) Masdari, M.S., Bidaki, M.: Analysis of secure LEACH-based clustering protocols in wireless sensor networks. Wirel. Netw. 9(3), 345–358 (2013)
6.
Zurück zum Zitat He, X., Niedermeier, M., Meer, D.H.: Dynamic key management in wireless sensor networks: a survey. J. Netw. Comput. Appl. 36(2), 611–622 (2013)CrossRef He, X., Niedermeier, M., Meer, D.H.: Dynamic key management in wireless sensor networks: a survey. J. Netw. Comput. Appl. 36(2), 611–622 (2013)CrossRef
7.
Zurück zum Zitat Yaeghoobi, S.B.K., Ebadati, O.M.E.: Performance of triangle segments tree model to optimize energy efficiency in wireless sensor networks. In: Proceedings of 3rd International Conference on Machine Learning and Computing, vol. 3, pp. 314–320 (2011) Yaeghoobi, S.B.K., Ebadati, O.M.E.: Performance of triangle segments tree model to optimize energy efficiency in wireless sensor networks. In: Proceedings of 3rd International Conference on Machine Learning and Computing, vol. 3, pp. 314–320 (2011)
8.
Zurück zum Zitat Yaeghoobi, S.B.K., Soni, M.K., Tyagi, S.S., Ebadati, E.O.M.: Impact of NP-complete in triangle segments tree energy efficiency model in wireless sensor networks. J. Basic Appl. Sci. Result 3(9), 808–817 (2013) Yaeghoobi, S.B.K., Soni, M.K., Tyagi, S.S., Ebadati, E.O.M.: Impact of NP-complete in triangle segments tree energy efficiency model in wireless sensor networks. J. Basic Appl. Sci. Result 3(9), 808–817 (2013)
9.
Zurück zum Zitat Yaeghoobi, S.B.K., Tyagi, S.S., Soni, M.K., Ebadati, E.O.M.: SAERP: an energy efficiency real-time routing protocol in WSNs. Proc. Int. Conf. Optim. Reliab. Inf. Technol. 5, 617–622 (2014) Yaeghoobi, S.B.K., Tyagi, S.S., Soni, M.K., Ebadati, E.O.M.: SAERP: an energy efficiency real-time routing protocol in WSNs. Proc. Int. Conf. Optim. Reliab. Inf. Technol. 5, 617–622 (2014)
10.
Zurück zum Zitat Kamel, I.H.J.: A lightweight data integrity scheme for sensor networks. Wirel. Sens. Netw. 4(2), 213–221 (2011) Kamel, I.H.J.: A lightweight data integrity scheme for sensor networks. Wirel. Sens. Netw. 4(2), 213–221 (2011)
11.
Zurück zum Zitat Zhang, W.G.C.: Group rekeying for filtering false data in sensor networks: a predistribution and local collaborationbased approach. J. Sens. 3(5), 213–229 (2005) Zhang, W.G.C.: Group rekeying for filtering false data in sensor networks: a predistribution and local collaborationbased approach. J. Sens. 3(5), 213–229 (2005)
12.
Zurück zum Zitat Dini, G., Savino, I.M.: An efficient key revocation protocol for wireless sensor networks. Proc. Int. Symp. IEEE Comput. Soc. World Wirel Mob. Multimed. Netw. 4, 213–219 (2010) Dini, G., Savino, I.M.: An efficient key revocation protocol for wireless sensor networks. Proc. Int. Symp. IEEE Comput. Soc. World Wirel Mob. Multimed. Netw. 4, 213–219 (2010)
13.
Zurück zum Zitat Jiang, Y., Chuang, L., Minghui, S., Xuemin, S.: Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Netw. 5(1), 14–23 (2007)CrossRef Jiang, Y., Chuang, L., Minghui, S., Xuemin, S.: Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Netw. 5(1), 14–23 (2007)CrossRef
14.
Zurück zum Zitat Khan, F.I., Jameel, H., Raazi, S.M.K., Khan, A.M., Huh, E.M.: An efficient re-keying scheme for cluster based wireless sensor networks. In: Proceedings of International Conference on Computational Science and Its Applications, pp. 1028–1037 (2007) Khan, F.I., Jameel, H., Raazi, S.M.K., Khan, A.M., Huh, E.M.: An efficient re-keying scheme for cluster based wireless sensor networks. In: Proceedings of International Conference on Computational Science and Its Applications, pp. 1028–1037 (2007)
15.
Zurück zum Zitat Seyed, H., Amir, H., Vanesa, D.: A distributed group rekeying scheme for wireless sensor networks. In: Proceedings of the 6th International Conference on Systems and Networks Communications, vol. 4, pp. 345–349 (2011) Seyed, H., Amir, H., Vanesa, D.: A distributed group rekeying scheme for wireless sensor networks. In: Proceedings of the 6th International Conference on Systems and Networks Communications, vol. 4, pp. 345–349 (2011)
16.
Zurück zum Zitat Ferreira, A.C., Vilaa, M.A., Oliveira, B.L., Habib, E., Wong, H.C., Loureiro, A.A.: On the security of cluster-based communication protocols for wireless sensor networks. In: Proceedings of International Conference on Networking, pp. 449–458 (2005) Ferreira, A.C., Vilaa, M.A., Oliveira, B.L., Habib, E., Wong, H.C., Loureiro, A.A.: On the security of cluster-based communication protocols for wireless sensor networks. In: Proceedings of International Conference on Networking, pp. 449–458 (2005)
17.
Zurück zum Zitat Ebadati, E.O.M., Kaur, H., Alam, M.A.: A secure confidence routing mechanism by using network-based intrusion detection systems over router monitoring controls. OLS J. Wirel. Inf. Netw. Bus. Inf. Syst. 6(1), 1–11 (2010) Ebadati, E.O.M., Kaur, H., Alam, M.A.: A secure confidence routing mechanism by using network-based intrusion detection systems over router monitoring controls. OLS J. Wirel. Inf. Netw. Bus. Inf. Syst. 6(1), 1–11 (2010)
18.
Zurück zum Zitat Ebadati, E.O.M., Kaur, H., Alam, M.A.: A performance analysis of chasing intruders by implementing mobile agents. Int. J. Secur. 4(4), 80–88 (2010) Ebadati, E.O.M., Kaur, H., Alam, M.A.: A performance analysis of chasing intruders by implementing mobile agents. Int. J. Secur. 4(4), 80–88 (2010)
19.
Zurück zum Zitat Kaur, H., Ebadati, E.O.M., Alam, M.A.: Implementation of portion approach in distributed firewall application for network security framework. Int. J. Comput. Sci. Issues 8(6), 211–221 (2011) Kaur, H., Ebadati, E.O.M., Alam, M.A.: Implementation of portion approach in distributed firewall application for network security framework. Int. J. Comput. Sci. Issues 8(6), 211–221 (2011)
20.
Zurück zum Zitat Kaur, H., Ebadati, E.O.M., Alam, M.A.: Optimization of micro-firewalls security layers in distributed network. In: Proceedings of International Conference on Future Information Technology, pp. 312–320. IACSIT Press (2011) Kaur, H., Ebadati, E.O.M., Alam, M.A.: Optimization of micro-firewalls security layers in distributed network. In: Proceedings of International Conference on Future Information Technology, pp. 312–320. IACSIT Press (2011)
21.
Zurück zum Zitat Ebadati, E.O.M., Kaur, H., Alam, M.A., Yaeghoobi, K.: Micro-firewalls for dynamic network security framework: a secure hybrid architecture. J. Netw. Secur. 4(2), 315–324 (2012) Ebadati, E.O.M., Kaur, H., Alam, M.A., Yaeghoobi, K.: Micro-firewalls for dynamic network security framework: a secure hybrid architecture. J. Netw. Secur. 4(2), 315–324 (2012)
22.
Zurück zum Zitat Turkanovic, M., Brumen, B., Holbl, M.: A novel user authentication and key agreementscheme for heterogeneous ad hoc wireless sensor networks based on the internet of things notion. Ad Hoc Netw. 20(2), 96–112 (2014)CrossRef Turkanovic, M., Brumen, B., Holbl, M.: A novel user authentication and key agreementscheme for heterogeneous ad hoc wireless sensor networks based on the internet of things notion. Ad Hoc Netw. 20(2), 96–112 (2014)CrossRef
23.
Zurück zum Zitat Komninos, N., Soroush, H., Salajegheh, M.: Light weight energy efficient encryption algorithm for sensor networks. In: Proceedings of IEEE 9th International Symposium on Communication Theory and Applications, pp. 312–317 (2007) Komninos, N., Soroush, H., Salajegheh, M.: Light weight energy efficient encryption algorithm for sensor networks. In: Proceedings of IEEE 9th International Symposium on Communication Theory and Applications, pp. 312–317 (2007)
24.
Zurück zum Zitat Preneel, B.V.R.: Cryptographic primitives for information authentication state of the art. J. Cryptogr. 2(3), 45–54 (1998)MATH Preneel, B.V.R.: Cryptographic primitives for information authentication state of the art. J. Cryptogr. 2(3), 45–54 (1998)MATH
25.
Zurück zum Zitat Singaravelu, P., Verma, S.: Performance analysis of multivariate cryptosystem schemes for wireless sensor network. Comput. Electr. Eng. 39(6), 1880–1893 (2013)CrossRef Singaravelu, P., Verma, S.: Performance analysis of multivariate cryptosystem schemes for wireless sensor network. Comput. Electr. Eng. 39(6), 1880–1893 (2013)CrossRef
26.
Zurück zum Zitat Boudia, O.R.M., Senouci, S.M., Feham, M.: A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. Ad Hoc Netw. 4(2), 34–45 (2015) Boudia, O.R.M., Senouci, S.M., Feham, M.: A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. Ad Hoc Netw. 4(2), 34–45 (2015)
27.
Zurück zum Zitat Sharma, G., Bala, S., Verma, A.K.: Security frameworks for wireless sensor networks-review. Procedia Technol. 6(1), 978–987 (2012)CrossRef Sharma, G., Bala, S., Verma, A.K.: Security frameworks for wireless sensor networks-review. Procedia Technol. 6(1), 978–987 (2012)CrossRef
28.
Zurück zum Zitat Turkanovi, M., Brumen, B., Hlbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the internet of things notion. Ad Hoc Netw. 20(3), 96–112 (2014)CrossRef Turkanovi, M., Brumen, B., Hlbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the internet of things notion. Ad Hoc Netw. 20(3), 96–112 (2014)CrossRef
29.
Zurück zum Zitat Amin, R., Biswas, G.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 23(2), 67–81 (2015) Amin, R., Biswas, G.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 23(2), 67–81 (2015)
30.
Zurück zum Zitat Lu, X., Lio, P., Wicker, F.: Security estimation model with directional antennas. In: Proceedings of IEEE International Conference on Military Communications, pp. 234–239 (2008) Lu, X., Lio, P., Wicker, F.: Security estimation model with directional antennas. In: Proceedings of IEEE International Conference on Military Communications, pp. 234–239 (2008)
31.
Zurück zum Zitat Wang, Q., Dai, H.N., Zhao, Q.: Eavesdropping security in wireless ad hoc networks with directional antennas. In: Proceedings of 22nd IEEE Iinternational Conference on Wireless and Optical Communication Conference, vol. 4, pp. 221–229 (2013) Wang, Q., Dai, H.N., Zhao, Q.: Eavesdropping security in wireless ad hoc networks with directional antennas. In: Proceedings of 22nd IEEE Iinternational Conference on Wireless and Optical Communication Conference, vol. 4, pp. 221–229 (2013)
32.
Zurück zum Zitat Dai, H.-N., Wang, Q., Li, D., Wong, C.-W.R.: On eavesdropping attacks in wireless sensor networks with directional antennas. Int. J. Distrib. Sens. Netw. 5(2), 67–78 (2013) Dai, H.-N., Wang, Q., Li, D., Wong, C.-W.R.: On eavesdropping attacks in wireless sensor networks with directional antennas. Int. J. Distrib. Sens. Netw. 5(2), 67–78 (2013)
33.
Zurück zum Zitat Zafer, M., Agrawal, D., Srivatsa, M.: Limitations of generating a secret key using wireless fading under active adversary. IEEE/ACM Trans. Netw. 20(5), 1440–1451 (2012)CrossRef Zafer, M., Agrawal, D., Srivatsa, M.: Limitations of generating a secret key using wireless fading under active adversary. IEEE/ACM Trans. Netw. 20(5), 1440–1451 (2012)CrossRef
34.
Zurück zum Zitat Li, X., Xu, J., Hong-Ning, D., Qinglin, Z., Chak Fong, C., Qiu, W.: On modeling eavesdropping attacks in wireless networks. J. Comput. Sci. 15(2), 67–81 (2014) Li, X., Xu, J., Hong-Ning, D., Qinglin, Z., Chak Fong, C., Qiu, W.: On modeling eavesdropping attacks in wireless networks. J. Comput. Sci. 15(2), 67–81 (2014)
35.
Zurück zum Zitat Parno, A.P.B., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. J. Secur. Sens. Netw. 8(4), 56–67 (2005) Parno, A.P.B., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. J. Secur. Sens. Netw. 8(4), 56–67 (2005)
36.
Zurück zum Zitat Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 313–318 (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 313–318 (2002)
37.
Zurück zum Zitat Wang, Y., Ramamurthy, B., Zou, X.: An efficient key revocation scheme for wireless sensor networks. In: Proceedings of IEEE International Conference on Communications, pp. 78–83 (2007) Wang, Y., Ramamurthy, B., Zou, X.: An efficient key revocation scheme for wireless sensor networks. In: Proceedings of IEEE International Conference on Communications, pp. 78–83 (2007)
Metadaten
Titel
Secure Distributed Group Rekeying Scheme for Cluster Based Wireless Sensor Networks Using Multilevel Encryption
verfasst von
Mohsen Yazdinejad
Faezeh Nayyeri
Omid Mahdi Ebadati E.
Nasim Afshari
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-53472-5_6