Browse > Article
http://dx.doi.org/10.3837/tiis.2013.08.017

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks  

Jiang, Rong (School of Computer, National University of Defense Technology)
Luo, Jun (School of Computer, National University of Defense Technology)
Wang, Xiaoping (School of Computer, National University of Defense Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.8, 2013 , pp. 2042-2060 More about this Journal
Abstract
In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.
Keywords
wireless sensor networks; group key management; route key tree; network security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P. Cheng, R. Deng, and J. Chen, "Energy-Efficient Cooperative Spectrum Sensing in Sensor-Aided Cognitive Radio Networks," IEEE Wireless Communications, vol.19,no.6, pp. 100-105, Dec. 2012.   DOI   ScienceOn
2 R. Jiang, J. Luo, and X. Wang, "An attack tree based risk assessment for location privacy in wireless sensor networks," in Proc. of 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, Sep. 21-23, 2012.
3 C. Lai, H. Li, Y. Zhang, and J. Cao, "Security issues on machine to machine communications," KSII Transaction on Internet and Information Systems, vol. 6, no. 2, pp. 498-514, Feb. 2012.
4 M. Wen, J. Li, Z. Yin, et al., "A NTRU Based Key Generation and Data Transmission Scheme for Sensor Networks," Journal of Computational Information Systems, vol. 8, no.6, pp. 2417-2424, June, 2012.
5 S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003.   DOI   ScienceOn
6 M. Wen, Y. Zheng, W. Ye, K. Chen, and W. Qiu, "A key management protocol with robust continuity for sensor networks," Computer Standards & Interfaces, vol. 31, no. 4, pp. 642-647, Apr. 2009.   DOI   ScienceOn
7 C. Lai, H. Li, X. Li, and J. Cao, "A novel group access authentication and key agreement protocol for machine-type communication," Transactions on Emerging Telecommunications Technologies, 2013.
8 R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 1, pp. 32-43, Jan. 2012.   DOI   ScienceOn
9 R. Jiang, J. Luo, F. Tu, and J. Zhong, "LEP: A lightweight key management scheme based on EBS and polynomial for wireless sensor networks," in Proc. of IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, Sep. 14-16, 2011.
10 C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.   DOI   ScienceOn
11 L. Lazos and R. Poovendran, "Secure broadcast in energy-aware wireless sensor networks," DTIC Document, Tech. Rep., 2002.
12 R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga, "LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks," in Proc. of IEEE International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 6-9, 2003.
13 J.-H. Huang, J. Buckingham, and R. Han, "A level key infrastructure for secure and efficient group communication in wireless sensor network," in Proc. of the IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 249-260, Sept. 2005.
14 J.-H. Son, J.-S. Lee, and S.-W. Seo, "Topological key hierarchy for energy-efficient group key management in wireless sensor networks," Wireless personal communications, vol. 52, no. 2, pp. 359-382, Jan. 2010.   DOI   ScienceOn
15 J. Polastre, R. Szewczyk, C. Sharp, and D. Culler, "The mote revolution: Low power wireless sensor network devices," in Proc. of IEEE HotChips 16, vol. 16, pp. 22-24, 2004.
16 A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, Sept. 2002.   DOI   ScienceOn
17 Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
18 M. Shi, X. Shen, Y. Jiang, and C. Lin, "Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 38-46, Oct. 2007.   DOI   ScienceOn
19 D. Wei, S. Kaplan, and H. A. Chan, "Energy efficient clustering algorithms for wireless sensor networks," in Proc. of IEEE International Conference on Communications Workshops, pp. 236-240, May 19-23, 2008.
20 D.-Y. Kim, J. Cho, and B.-S. Jeong, "Practical data transmission in cluster-based sensor networks." KSII Transact0ions on Internet and Information Systems (TIIS), vol. 4, no. 3 pp. 224-242, June 2010.
21 R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed efficient source privacy preservation scheme for wireless sensor networks," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-6, May 23-27, 2010.
22 X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Communications and Mobile Computing (Wiley), vol. 10, no. 6, pp. 843-856, June, 2010.
23 T. I. Inc, "Single-chip 2.4GHz IEEE 802.15.4 compliant and Zigbee (TM) ready RF transceiver," Tech. Rep., 2007.
24 I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
25 X. Wang, J. Luo, Y. Liu, S. Li, and D. Dong, "Component-based localization in sparse wireless networks," IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 540-548, Apr. 2011.   DOI   ScienceOn
26 R. Deng, J. Chen, C. Yuen, P. Cheng, and Y. Sun, "Energy-Efficient Cooperative Spectrum Sensing by Optimal Scheduling in Sensor-Aided Cognitive Radio Networks," IEEE Transactions on Vehicular Technology, vol. 61, no.2, pp. 716-725, Feb. 2012.   DOI   ScienceOn