Skip to main content

2020 | OriginalPaper | Buchkapitel

SYSLOC: Hybrid Key Generation in Sensor Network

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sensor network provides a flexible and economical platform for its users. These are low-cost gadgets utilized to monitor and track objects of interest. Security is one of the primary concerns in this network [80]. Many security methods are available. Encryption is one such methodology used to protect data. The proposed work uses static and dynamic nodes to bring the act into play. The scheme uses hybrid key generation approach. Symmetric and location key are combined to tackle the attacks. Mutual authentication is adopted to identify the source and the destination. Endorsement keys are concatenated to the data before being transmitted. The work preserves future and past concealment in the network. Using this method the system is able to tackle various attacks. This approach secures the network against wormhole, Sinkhole and Sybil attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Diop, A., Qi, Y., Wang, Q.: An efficient and secure session key management scheme for cluster based wireless sensors networks. In: Joint International Conference, ICPCA/SWS 2013, Vina del Mar, Chile, 5–7 December 2013, vol. 8351, pp. 33–44 (2013) Diop, A., Qi, Y., Wang, Q.: An efficient and secure session key management scheme for cluster based wireless sensors networks. In: Joint International Conference, ICPCA/SWS 2013, Vina del Mar, Chile, 5–7 December 2013, vol. 8351, pp. 33–44 (2013)
2.
Zurück zum Zitat Ambika, N., Raju, G.T.: ECAWSN - eliminating compromised node with the help of auxiliary nodes. Wirel. Sens. Netw. 9(2), 78–84 (2014) Ambika, N., Raju, G.T.: ECAWSN - eliminating compromised node with the help of auxiliary nodes. Wirel. Sens. Netw. 9(2), 78–84 (2014)
3.
Zurück zum Zitat Blom, R.: An optimal class of symmetric key generation systems. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) (1984) Blom, R.: An optimal class of symmetric key generation systems. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) (1984)
4.
Zurück zum Zitat Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly secure key distribution for dynamic conferences. In: Proceedings of the 29th International Cryptology Conference (CRYPTO) (1993)CrossRef Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly secure key distribution for dynamic conferences. In: Proceedings of the 29th International Cryptology Conference (CRYPTO) (1993)CrossRef
5.
Zurück zum Zitat Chong, C., Kumar, S.: Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 91(8), 1247–1256 (2003)CrossRef Chong, C., Kumar, S.: Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 91(8), 1247–1256 (2003)CrossRef
6.
Zurück zum Zitat Çamtepe, S.A., Yener, B., Yung, M.: Expander graph based key distribution mechanisms in wireless sensor networks. In: Proceedings of IEEE International Conference on Communications (ICC) (2006) Çamtepe, S.A., Yener, B., Yung, M.: Expander graph based key distribution mechanisms in wireless sensor networks. In: Proceedings of IEEE International Conference on Communications (ICC) (2006)
7.
Zurück zum Zitat Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2), 346–358 (2007)CrossRef Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2), 346–358 (2007)CrossRef
8.
Zurück zum Zitat Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P) (2003) Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P) (2003)
9.
Zurück zum Zitat Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM) (2005) Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM) (2005)
10.
Zurück zum Zitat Chan, S., Poovendran, R., Sun, M.: A key management scheme in distributed sensor networks using attack probabilities. In: Proceedings of the IEEE Global Communications Conference, Exhibition & Industry Forum (Globecom) (2005) Chan, S., Poovendran, R., Sun, M.: A key management scheme in distributed sensor networks using attack probabilities. In: Proceedings of the IEEE Global Communications Conference, Exhibition & Industry Forum (Globecom) (2005)
11.
Zurück zum Zitat Chen, C., Song, M., Hsieh, G.: Intrusion detection of Sinkhole attack in large-scale wireless sensor network. In: WCNIS 2010, pp. 711–716 (2010) Chen, C., Song, M., Hsieh, G.: Intrusion detection of Sinkhole attack in large-scale wireless sensor network. In: WCNIS 2010, pp. 711–716 (2010)
12.
Zurück zum Zitat Wu, C., Li, S., Zhang, Y.: Key management scheme based on secret sharing for wireless sensor networks. Int. J. Inf. Commun. Technol. 7(2–3), 126 (2015) Wu, C., Li, S., Zhang, Y.: Key management scheme based on secret sharing for wireless sensor networks. Int. J. Inf. Commun. Technol. 7(2–3), 126 (2015)
13.
Zurück zum Zitat Du, D., Xiong, H., Wang, H.: An efficient key management scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, Article ID 406254, 14 (2012) Du, D., Xiong, H., Wang, H.: An efficient key management scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, Article ID 406254, 14 (2012)
14.
Zurück zum Zitat Deng, J., Han, Y.S.: Babel: using a common bridge node to deliver multiple keys in wireless sensor networks. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (2007) Deng, J., Han, Y.S.: Babel: using a common bridge node to deliver multiple keys in wireless sensor networks. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (2007)
15.
Zurück zum Zitat Damodaran, D., Singh, R., Le, P.D.: Group key management in wireless networks using session keys. In: Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006) (2006) Damodaran, D., Singh, R., Le, P.D.: Group key management in wireless networks using session keys. In: Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006) (2006)
16.
Zurück zum Zitat Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proceedings of the ACM SASN, Fairfax, VA, October 2003, pp. 72–82 (2003) Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proceedings of the ACM SASN, Fairfax, VA, October 2003, pp. 72–82 (2003)
17.
Zurück zum Zitat Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM) (2004) Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM) (2004)
18.
Zurück zum Zitat Du, W., Deng, J., Han, Y.S., Varshney, P.: A pair-wise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the Annual ACM Computer and Communications Security (CCS) (2003) Du, W., Deng, J., Han, Y.S., Varshney, P.: A pair-wise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the Annual ACM Computer and Communications Security (CCS) (2003)
19.
Zurück zum Zitat Ngai, E.C.H., Liu, J., Lyu, M.R.: An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. J. Comput. Commun. 30(11–12), 2353–2364 (2007)CrossRef Ngai, E.C.H., Liu, J., Lyu, M.R.: An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. J. Comput. Commun. 30(11–12), 2353–2364 (2007)CrossRef
20.
Zurück zum Zitat Eschenauer, L., Gligor, V.: A key management scheme for distributed sensor networks. In: Proceedings of the Annual ACM Computer and Communications Security (CCS) (2002) Eschenauer, L., Gligor, V.: A key management scheme for distributed sensor networks. In: Proceedings of the Annual ACM Computer and Communications Security (CCS) (2002)
21.
Zurück zum Zitat Pottie, G.J., Kaiser, W.J.: Wireless integrated network sensors. Commun. ACM 43, 51–66 (2000)CrossRef Pottie, G.J., Kaiser, W.J.: Wireless integrated network sensors. Commun. ACM 43, 51–66 (2000)CrossRef
22.
Zurück zum Zitat Gungor, V.C., Hancke, G.P.: Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56(10), 4258–4265 (2009)CrossRef Gungor, V.C., Hancke, G.P.: Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56(10), 4258–4265 (2009)CrossRef
23.
Zurück zum Zitat Hakala, I., Tikkakoski, M., Kivela, I.: Wireless sensor network in environmental monitoring - case foxhouse. In: Second International Conference on Sensor Technologies and Applications, pp. 202–208 (2008) Hakala, I., Tikkakoski, M., Kivela, I.: Wireless sensor network in environmental monitoring - case foxhouse. In: Second International Conference on Sensor Technologies and Applications, pp. 202–208 (2008)
24.
Zurück zum Zitat Alzaid, H., Park, D., Nieto, J.G., Boyd, C., Foo, E.: A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In: Proceedings of the First International ICST Conference, S-CUBE 2009, Pisa, Italy, 7–9 September 2009, vol. 24, pp. 66–82 (2009) Alzaid, H., Park, D., Nieto, J.G., Boyd, C., Foo, E.: A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In: Proceedings of the First International ICST Conference, S-CUBE 2009, Pisa, Italy, 7–9 September 2009, vol. 24, pp. 66–82 (2009)
25.
Zurück zum Zitat Zhao, H., Qin, J., Shu, M., Hu, J.: A hash chains based key management scheme for wireless sensor networks. In: Proceedings of the 4th International Symposium, CSS 2012, Melbourne, Australia, 12–13 December 2012, vol. 7672, pp. 296–308 (2012)CrossRef Zhao, H., Qin, J., Shu, M., Hu, J.: A hash chains based key management scheme for wireless sensor networks. In: Proceedings of the 4th International Symposium, CSS 2012, Melbourne, Australia, 12–13 December 2012, vol. 7672, pp. 296–308 (2012)CrossRef
26.
Zurück zum Zitat Akyildiz, I., Su, W., Sankarasubramaniam, Y.: A survey on sensor networks. IEEE Commun. 40(8), 102–114 (2002)CrossRef Akyildiz, I., Su, W., Sankarasubramaniam, Y.: A survey on sensor networks. IEEE Commun. 40(8), 102–114 (2002)CrossRef
27.
Zurück zum Zitat Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a sinkhole attack in wireless sensor networks: the intruder side. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, pp. 526–531 (2008) Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a sinkhole attack in wireless sensor networks: the intruder side. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, pp. 526–531 (2008)
28.
Zurück zum Zitat Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses, January 2004 Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses, January 2004
29.
Zurück zum Zitat Huang, J.-Y., Liao, I.-E., Tang, H.-W.: A forward authentication key management scheme for heterogeneous sensor networks. EURASIP J. Wirel. Commun. Netw. 2011(1), 1–10 (2011) Huang, J.-Y., Liao, I.-E., Tang, H.-W.: A forward authentication key management scheme for heterogeneous sensor networks. EURASIP J. Wirel. Commun. Netw. 2011(1), 1–10 (2011)
30.
Zurück zum Zitat Liu, J.-C., Huang, Y.-L., Leu, F.-Y., You, I., Chiang, F.-C., Yang, C.-T., Chu, W.C.-C.: A multiple-key management scheme in wireless sensor networks. In: Proceedings of the CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, 2–6 September 2013, vol. 8128, pp. 337–344 (2013)CrossRef Liu, J.-C., Huang, Y.-L., Leu, F.-Y., You, I., Chiang, F.-C., Yang, C.-T., Chu, W.C.-C.: A multiple-key management scheme in wireless sensor networks. In: Proceedings of the CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, 2–6 September 2013, vol. 8128, pp. 337–344 (2013)CrossRef
31.
Zurück zum Zitat Chatterjee, K., De, A., Gupta, D.: An improved ID-based key management scheme in wireless sensor network. In: Proceedings of the Third International Conference, ICSI 2012, Shenzhen, China, 17–20 June 2012, vol. 7332, pp. 351–359 (2012) Chatterjee, K., De, A., Gupta, D.: An improved ID-based key management scheme in wireless sensor network. In: Proceedings of the Third International Conference, ICSI 2012, Shenzhen, China, 17–20 June 2012, vol. 7332, pp. 351–359 (2012)
32.
Zurück zum Zitat Ssu, K.-F., Wang, W.-T., Chang, W.-C.: Detecting sybil attacks in wireless sensor networks using neighboring information. Int. J. Comput. Telecommun. Netw. 53(18), 3042–3056 (2009)MATHCrossRef Ssu, K.-F., Wang, W.-T., Chang, W.-C.: Detecting sybil attacks in wireless sensor networks using neighboring information. Int. J. Comput. Telecommun. Netw. 53(18), 3042–3056 (2009)MATHCrossRef
33.
Zurück zum Zitat Alagheband, M.R., Aref, M.R.: A secure key management framework for heterogeneous wireless sensor networks. In: Proceedings of the IFIP International Federation for Information Processing, vol. 7025, pp. 18–31 (2011)CrossRef Alagheband, M.R., Aref, M.R.: A secure key management framework for heterogeneous wireless sensor networks. In: Proceedings of the IFIP International Federation for Information Processing, vol. 7025, pp. 18–31 (2011)CrossRef
34.
Zurück zum Zitat Doraipandian, M., Rajapackiyam, E., Neelamegam, P., Rai, A.K.: An efficient and hybrid key management scheme for three tier wireless sensor networks using LU matrix. In: Proceedings of the First International Conference, ACC 2011, Kochi, India, 22–24 July 2011, vol. 192, pp. 111–121 (2011)CrossRef Doraipandian, M., Rajapackiyam, E., Neelamegam, P., Rai, A.K.: An efficient and hybrid key management scheme for three tier wireless sensor networks using LU matrix. In: Proceedings of the First International Conference, ACC 2011, Kochi, India, 22–24 July 2011, vol. 192, pp. 111–121 (2011)CrossRef
35.
Zurück zum Zitat Duan, M., Xu, J.: An efficient location-based compromise-tolerant key management scheme for sensor networks. Inf. Process. Lett. 111, 503–507 (2011)MathSciNetMATHCrossRef Duan, M., Xu, J.: An efficient location-based compromise-tolerant key management scheme for sensor networks. Inf. Process. Lett. 111, 503–507 (2011)MathSciNetMATHCrossRef
36.
Zurück zum Zitat Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978)MATHCrossRef Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978)MATHCrossRef
37.
Zurück zum Zitat Mi, Q., Stankovic, J.A., Stoleru, R.: Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. In: ACM Conference on Wireless Network Security (WiSec) (2010) Mi, Q., Stankovic, J.A., Stoleru, R.: Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. In: ACM Conference on Wireless Network Security (WiSec) (2010)
38.
Zurück zum Zitat Messai, M.-L., Aliouat, M., Seba, H.: Tree based protocol for key management in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2010(1), 1–10 (2010) Messai, M.-L., Aliouat, M., Seba, H.: Tree based protocol for key management in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2010(1), 1–10 (2010)
39.
Zurück zum Zitat Labraoui, N., Gueroui, M., Aliouat, M.: Secure DVHop localization scheme against wormhole attacks in wireless sensor networks. Eur. Trans. Telecommun. 23, 303–316 (2011) Labraoui, N., Gueroui, M., Aliouat, M.: Secure DVHop localization scheme against wormhole attacks in wireless sensor networks. Eur. Trans. Telecommun. 23, 303–316 (2011)
40.
Zurück zum Zitat Dong, Q., Liu, D.: Using auxiliary sensors for pairwise key establishment in WSN. ACM Trans. Embed. Comput. Syst. 11(2), Article no. 59 (2012)CrossRef Dong, Q., Liu, D.: Using auxiliary sensors for pairwise key establishment in WSN. ACM Trans. Embed. Comput. Syst. 11(2), Article no. 59 (2012)CrossRef
41.
Zurück zum Zitat Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)MATHCrossRef Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)MATHCrossRef
42.
Zurück zum Zitat Kodali, R.K., Chougule, S.: Hybrid key management technique for WSN’s. In: 9th International Conference, QShine 2013, Greader Noida, India, 11–12 January 2013, vol. 115, pp. 854–865 (2013) Kodali, R.K., Chougule, S.: Hybrid key management technique for WSN’s. In: 9th International Conference, QShine 2013, Greader Noida, India, 11–12 January 2013, vol. 115, pp. 854–865 (2013)
43.
Zurück zum Zitat Zhu, S., Setia, S., Jajodia, S.: LEAP: effcient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computing and Communication security, Washington, DC, USA, October 2003, pp. 62–72 (2003) Zhu, S., Setia, S., Jajodia, S.: LEAP: effcient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computing and Communication security, Washington, DC, USA, October 2003, pp. 62–72 (2003)
44.
Zurück zum Zitat Banihashemian, S., Ghaemi, A., Hossien, M.: Centralized key management scheme in wireless sensor networks. Wirel. Pers. Commun. 60(3), 463–474 (2011)CrossRef Banihashemian, S., Ghaemi, A., Hossien, M.: Centralized key management scheme in wireless sensor networks. Wirel. Pers. Commun. 60(3), 463–474 (2011)CrossRef
45.
Zurück zum Zitat Seo, S.-H., Won, J., Sultana, S., Bertino, E.: Effective key management in dynamic wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 10(2), 371–383 (2015)CrossRef Seo, S.-H., Won, J., Sultana, S., Bertino, E.: Effective key management in dynamic wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 10(2), 371–383 (2015)CrossRef
46.
Zurück zum Zitat Erfani, S.H., Javadi, H.H., Rahmani, A.M.: A dynamic key management scheme for dynamic wireless sensor networks. Secur. Commun. Netw. 8(6), 1040–1049 (2015)CrossRef Erfani, S.H., Javadi, H.H., Rahmani, A.M.: A dynamic key management scheme for dynamic wireless sensor networks. Secur. Commun. Netw. 8(6), 1040–1049 (2015)CrossRef
47.
Zurück zum Zitat Sharmila, S., Umamaheswari, G.: Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In: International Conference on Process Automation, Control and Computing (PACC), pp. 1–6 (2011) Sharmila, S., Umamaheswari, G.: Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In: International Conference on Process Automation, Control and Computing (PACC), pp. 1–6 (2011)
48.
Zurück zum Zitat Chen, S., Liao, X., Shu, R., Shen, X., Xu, X., Zheng, X.: Dynamic key management scheme in wireless sensor networks. In: Proceedings of the Second International Conference, ICHCC 2011, Singapore, 5–6 May 2011, vol. 163, pp. 381–385 (2011) Chen, S., Liao, X., Shu, R., Shen, X., Xu, X., Zheng, X.: Dynamic key management scheme in wireless sensor networks. In: Proceedings of the Second International Conference, ICHCC 2011, Singapore, 5–6 May 2011, vol. 163, pp. 381–385 (2011)
49.
Zurück zum Zitat Tsai, S.C., Tzeng, W.G., Zhou, K.Y.: Key establishment schemes against storage bounded adversaries in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1218–1222 (2009)CrossRef Tsai, S.C., Tzeng, W.G., Zhou, K.Y.: Key establishment schemes against storage bounded adversaries in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1218–1222 (2009)CrossRef
50.
Zurück zum Zitat Qiu, W., Zhou, Y., Zhu, B., Zheng, Y., Gong, Z.: Key-insulated encryption based group key management for wireless sensor network. J. Central South Univ. 20(5), 1277–1284 (2013)CrossRef Qiu, W., Zhou, Y., Zhu, B., Zheng, Y., Gong, Z.: Key-insulated encryption based group key management for wireless sensor network. J. Central South Univ. 20(5), 1277–1284 (2013)CrossRef
51.
Zurück zum Zitat Zhang, Y., Li, X., Zhen, Y., Zeng, L.: Multihop-based key management in hierarchical wireless sensor network. In: Proceedings of the 7th International Conference, GPC 2012, Hong Kong, China, 11–13 May 2012, vol. 7296, pp. 302–311 (2012)CrossRef Zhang, Y., Li, X., Zhen, Y., Zeng, L.: Multihop-based key management in hierarchical wireless sensor network. In: Proceedings of the 7th International Conference, GPC 2012, Hong Kong, China, 11–13 May 2012, vol. 7296, pp. 302–311 (2012)CrossRef
52.
Zurück zum Zitat Sun, Z., Wu, W., Xing, X., Li, C., Nie, Y., Cao, Y.: A hierarchical shared key algorithm in wireless sensor networks. In: Proceedings of the ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18–20 November 2015, vol. 9532, pp. 405–412 (2015) Sun, Z., Wu, W., Xing, X., Li, C., Nie, Y., Cao, Y.: A hierarchical shared key algorithm in wireless sensor networks. In: Proceedings of the ICA3PP International Workshops and Symposiums, Zhangjiajie, China, 18–20 November 2015, vol. 9532, pp. 405–412 (2015)
53.
Zurück zum Zitat Su, Z., Jiang, Y., Ren, F., Lin, C., Chu, X.: Distributed KDC-based random pairwise key establishment in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2010, Article no. 11 (2010) Su, Z., Jiang, Y., Ren, F., Lin, C., Chu, X.: Distributed KDC-based random pairwise key establishment in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2010, Article no. 11 (2010)
54.
Zurück zum Zitat Zhuang, L.Q., Goh, K.M., Zhang, J.B.: The wireless sensor networks for factory automation: issues and challenges. In: IEEE Conference on Emerging Technologies and Factory Automation, ETFA 2007, pp. 141–148 (2007) Zhuang, L.Q., Goh, K.M., Zhang, J.B.: The wireless sensor networks for factory automation: issues and challenges. In: IEEE Conference on Emerging Technologies and Factory Automation, ETFA 2007, pp. 141–148 (2007)
55.
Zurück zum Zitat Giruka, V.C., Singhal, M., Royalty, J., Varanasi, S.: Security in wireless sensor networks. Wirel. Commun. Mob. Comput. 8, 1–24 (2008)CrossRef Giruka, V.C., Singhal, M., Royalty, J., Varanasi, S.: Security in wireless sensor networks. Wirel. Commun. Mob. Comput. 8, 1–24 (2008)CrossRef
56.
Zurück zum Zitat Lee, J., Park, G.L., Kang, M.J.: A message scheduling scheme in hybrid telematics network. In: Computational Science and Its Applications, ICCSA 2008. Lecture Notes in Computer Science, vol. 5072 (2008) Lee, J., Park, G.L., Kang, M.J.: A message scheduling scheme in hybrid telematics network. In: Computational Science and Its Applications, ICCSA 2008. Lecture Notes in Computer Science, vol. 5072 (2008)
57.
Zurück zum Zitat Law, C., Kwok, Y.: On efficient key redistribution in wireless sensor networks. In: IEEE International Conference of World of Wireless, Mobile and Multimedia Networks, Espoo, Finland (2007) Law, C., Kwok, Y.: On efficient key redistribution in wireless sensor networks. In: IEEE International Conference of World of Wireless, Mobile and Multimedia Networks, Espoo, Finland (2007)
58.
Zurück zum Zitat Yang, B., Zhang, J.: Physical layer secret-key generation scheme for transportation security sensor network. Sensors 17(7), 1524 (2017)CrossRef Yang, B., Zhang, J.: Physical layer secret-key generation scheme for transportation security sensor network. Sensors 17(7), 1524 (2017)CrossRef
59.
Zurück zum Zitat Van Torre, P.: Channel-based key generation for encrypted body-worn wireless sensor networks. Sensors 16(9), 1453 (2016)CrossRef Van Torre, P.: Channel-based key generation for encrypted body-worn wireless sensor networks. Sensors 16(9), 1453 (2016)CrossRef
60.
Zurück zum Zitat Kumar, S., Singh, R.K.: Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN. Int. J. Commun. Netw. Distrib. Syst. 17(2), 189–201 (2016)CrossRef Kumar, S., Singh, R.K.: Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN. Int. J. Commun. Netw. Distrib. Syst. 17(2), 189–201 (2016)CrossRef
61.
Zurück zum Zitat Zhan, F., Yao, N., Gao, Z., Tan, G.: A novel key generation method for wireless sensor networks based on system of equations. J. Netw. Comput. Appl. 82, 114–127 (2017)CrossRef Zhan, F., Yao, N., Gao, Z., Tan, G.: A novel key generation method for wireless sensor networks based on system of equations. J. Netw. Comput. Appl. 82, 114–127 (2017)CrossRef
62.
Zurück zum Zitat Tague, P., Poovendran, R.: Modelling adaptive node capture attacks in multi-hop wireless networks. Adhoc Netw. 5(6), 801–814 (2007) Tague, P., Poovendran, R.: Modelling adaptive node capture attacks in multi-hop wireless networks. Adhoc Netw. 5(6), 801–814 (2007)
63.
Zurück zum Zitat Di Pietro, R., Mancini, L.V., Mei, A.: Efficient and resilient key discovery based on pseudo-random key pre-deployment. In: IEEE Parallel and Distributed Symposium, p. 217 (2004) Di Pietro, R., Mancini, L.V., Mei, A.: Efficient and resilient key discovery based on pseudo-random key pre-deployment. In: IEEE Parallel and Distributed Symposium, p. 217 (2004)
64.
Zurück zum Zitat Shan, T.-H., Liu, C.-M.: Enhancing the key pre-distribution scheme on wireless sensor network. In: IEEE Asia-Pacific Services Computing Conference, pp. 1127–1131 (2008) Shan, T.-H., Liu, C.-M.: Enhancing the key pre-distribution scheme on wireless sensor network. In: IEEE Asia-Pacific Services Computing Conference, pp. 1127–1131 (2008)
65.
Zurück zum Zitat Martin, K.M., Paterson, M.B., Stinson, D.R.: Key pre-distribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Trans. Sens. Netw. 7(2), Article no. 11 (2010)CrossRef Martin, K.M., Paterson, M.B., Stinson, D.R.: Key pre-distribution for homogeneous wireless sensor networks with group deployment of nodes. ACM Trans. Sens. Netw. 7(2), Article no. 11 (2010)CrossRef
66.
Zurück zum Zitat Xiu-Li, R., Wei, Y.: Method of detecting the Sybil attack based on ranging in wireless sensor network. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, September 2009, pp. 1–4 (2009) Xiu-Li, R., Wei, Y.: Method of detecting the Sybil attack based on ranging in wireless sensor network. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, September 2009, pp. 1–4 (2009)
67.
Zurück zum Zitat Hu, Y., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef Hu, Y., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef
68.
Zurück zum Zitat Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting wormhole attacks in wireless sensor network with statistical analysis. In: International Conference on Information Engineering, pp. 251–254 (2010) Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting wormhole attacks in wireless sensor network with statistical analysis. In: International Conference on Information Engineering, pp. 251–254 (2010)
69.
Zurück zum Zitat Xu, L., Gulliver, T.A.: Performance analysis for M2M video transmission cooperative networks using transmit antenna selection. Multimed. Tools Appl. 76(22), 23891–23902 (2017)CrossRef Xu, L., Gulliver, T.A.: Performance analysis for M2M video transmission cooperative networks using transmit antenna selection. Multimed. Tools Appl. 76(22), 23891–23902 (2017)CrossRef
70.
Zurück zum Zitat Xu, L., Wang, J., Zhang, H., Gulliver, T.A.: Performance analysis of IAF relaying mobile D2D cooperative networks. J. Franklin Inst. 354, 902–916 (2017)MATHCrossRef Xu, L., Wang, J., Zhang, H., Gulliver, T.A.: Performance analysis of IAF relaying mobile D2D cooperative networks. J. Franklin Inst. 354, 902–916 (2017)MATHCrossRef
71.
Zurück zum Zitat Louw, J., Niezen, G., Ramotsoela, T.D., Abu-Mahfouz, A.M.: A key distribution scheme using elliptic curve cryptography in wireless sensor networks. In: 14th International Conference on Industrial Informatics (INDIN), pp. 1166–1170. IEEE, Poitiers (2016) Louw, J., Niezen, G., Ramotsoela, T.D., Abu-Mahfouz, A.M.: A key distribution scheme using elliptic curve cryptography in wireless sensor networks. In: 14th International Conference on Industrial Informatics (INDIN), pp. 1166–1170. IEEE, Poitiers (2016)
72.
Zurück zum Zitat Mehmood, A., Umar, M.M., Song, H.: ICMDS: secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Netw. 55, 97–106 (2017)CrossRef Mehmood, A., Umar, M.M., Song, H.: ICMDS: secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Netw. 55, 97–106 (2017)CrossRef
73.
Zurück zum Zitat Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.A., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. Secur. Anal. Intell. Cyber Phys. Syst. 6, 5688–5694 (2017)CrossRef Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.A., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. Secur. Anal. Intell. Cyber Phys. Syst. 6, 5688–5694 (2017)CrossRef
74.
Zurück zum Zitat Zhao, J.: Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links. IEEE/ACM Trans. Netw. 25(3), 1789–1802 (2017)CrossRef Zhao, J.: Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links. IEEE/ACM Trans. Netw. 25(3), 1789–1802 (2017)CrossRef
75.
Zurück zum Zitat Gandino, F., Ferrero, R., Rebaudengo, M.: A key distribution scheme for mobile wireless sensor networks: q-s-composite. IEEE Trans. Inf. Forensics Secur. 12(1), 34–47 (2017)CrossRef Gandino, F., Ferrero, R., Rebaudengo, M.: A key distribution scheme for mobile wireless sensor networks: q-s-composite. IEEE Trans. Inf. Forensics Secur. 12(1), 34–47 (2017)CrossRef
76.
Zurück zum Zitat Jan, M.A., Nanda, P., Usman, M., He, X.: PAWN: a payload-based mutual authentication scheme for wireless sensor networks. Concurr. Comput.: Pract. Exp. 29(17), 1–32 (2010)CrossRef Jan, M.A., Nanda, P., Usman, M., He, X.: PAWN: a payload-based mutual authentication scheme for wireless sensor networks. Concurr. Comput.: Pract. Exp. 29(17), 1–32 (2010)CrossRef
77.
Zurück zum Zitat Nanda, P., He, X., Liu, R.P., Jan, M.A.: A sybil attack detection scheme for a centralized clustering-based hierarchical network. In: IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, pp. 1–8 (2015) Nanda, P., He, X., Liu, R.P., Jan, M.A.: A sybil attack detection scheme for a centralized clustering-based hierarchical network. In: IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, pp. 1–8 (2015)
78.
Zurück zum Zitat Arya, I.S., Binu, G.S.: Cross layer approach for detection and prevention of sinkhole attack using a mobile agent. In: 2nd International Conference on Communication and Electronics Systems (ICCES 2017), pp. 359–365 (2017) Arya, I.S., Binu, G.S.: Cross layer approach for detection and prevention of sinkhole attack using a mobile agent. In: 2nd International Conference on Communication and Electronics Systems (ICCES 2017), pp. 359–365 (2017)
79.
Zurück zum Zitat Bendjima, M., Feham, M.: Wormhole attack detection in wireless sensor networks. In: SAI Computing Conference 2016, London, UK, pp. 1319–1326 (2016) Bendjima, M., Feham, M.: Wormhole attack detection in wireless sensor networks. In: SAI Computing Conference 2016, London, UK, pp. 1319–1326 (2016)
80.
Zurück zum Zitat Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.): Futuristic Trends in Network. Communication in Computer and Information Science, vol. 958. Springer, Singapore (2019) Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.): Futuristic Trends in Network. Communication in Computer and Information Science, vol. 958. Springer, Singapore (2019)
Metadaten
Titel
SYSLOC: Hybrid Key Generation in Sensor Network
verfasst von
N. Ambika
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-40305-8_16

Neuer Inhalt