Browse > Article
http://dx.doi.org/10.3837/tiis.2016.03.017

Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks  

Kim, Daehee (Department of Electronics Engineering, Korea University)
Kim, Dongwan (Department of Electronics Engineering, Korea University)
An, Sunshin (Department of Electronics Engineering, Korea University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.3, 2016 , pp. 1249-1272 More about this Journal
Abstract
In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks.
Keywords
Wireless sensor networks; communication pattern; heterogeneous wireless sensor networks; key establishment; on-demand; broadcast authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 I. F. Akyildiz, and W. Su, Weilian, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August, 2002. Article (CrossRef Link).   DOI
2 X. Chen, K. Makki, K. Yen and N. Pissinou, “Sensor network security: a survey,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52-73, 2009. Article (CrossRef Link).   DOI
3 J. Zhang, and V. Varadharajan, “Wireless sensor network key management survey and taxonomy,” Journal of Network and Computer Applications, vol. 33, no. 2, pp. 63-75, March, 2010. Article (CrossRef Link).   DOI
4 L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. of 9th ACM Conf. on Computer and Communications Security, pp. 41-47, November 18-22, 2002. Article (CrossRef Link).
5 H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. of 2003 Symposium on Security and Privacy, pp. 197-213, May 11-14, 2003. Article (CrossRef Link).
6 W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228–258, May, 2005. Article (CrossRef Link).   DOI
7 S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient security mechanisms for large-scale distributed sensor networks,” ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500–528, November, 2006. Article (CrossRef Link).   DOI
8 M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh, "Exploiting heterogeneity in sensor networks," in Proc. of 24th Annual Joint Conf. of the IEEE Computer and Communications Societies, pp. 878-890, March 13-17, 2005. Article (CrossRef Link).
9 X. Du, Y. Xiao, M. Guizani, and H. Chen, “An effective key management scheme for heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, January, 2007. Article (CrossRef Link).   DOI
10 Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, “Efficient hybrid security mechanisms for heterogeneous sensor networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 663-677, June, 2007. Article (CrossRef Link).   DOI
11 G. J. Popek, and C. S. Kline, “Encryption and secure computer networks,” ACM Computing Surveys, vol. 11, no. 4, pp. 331-356, December, 1979. Article (CrossRef Link).   DOI
12 D. Malan, M. Welsh, and M. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," in Proc. of 1st Annual IEEE Communications Society Conf. on Sensor and Ad Hoc Communications and Networks, pp. 71-80, October 4-7, 2004. Article (CrossRef Link).
13 A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. of 3rd IEEE Int. Conf. on Pervasive Computing and Communications, pp. 324-328, March 8-12, 2005. Article (CrossRef Link).
14 N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, pp. 203–209, 1987. Article (CrossRef Link).   DOI
15 R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, February, 1978. Article (CrossRef Link).   DOI
16 R. Azarderakhsh, A. Reyhani-Masoleh, and Z. Abid, "A key management scheme for cluster based wireless sensor networks," in Proc. of IEEE/IFIP Int. Conf. on Embedded and Ubiquitous Computing, pp. 222-227, December 17-20, 2008. Article (CrossRef Link).
17 W. Abdallah, N. Boudriga, D. Kim, and S. An, "An efficient and scalable key management mechanism for wireless sensor networks," in Proc. of 16th Int. Conf. on Advanced Communication Technology, pp. 687-692, February 16-19, 2014. Article (CrossRef Link).
18 X. Du, M. Guizani, Y. Xiao, and H. Chen, “A routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1223-1229, March, 2009. Article (CrossRef Link).   DOI
19 K. Lu, Y. Qian, M. Guizani, and H. Chen, “A framework for a distributed key management scheme in heterogeneous wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 2, pp. 639-647, February, 2008. Article (CrossRef Link).   DOI
20 D. Kim, S. Kang, and S. An, "Energy efficient time synchronization for target tracking in heterogeneous sensor networks," in Proc. of 8th Int. Conf. for Internet Technology and Secured Transactions, pp. 238-243, December 9-12, 2013. Article (CrossRef Link).
21 F. Simjee and P. H. Chou, "Everlast: long-life, supercapacitor-operated wireless sensor node," in Proc. of 2006 Int. Symposium on Low Power Electronics and Design, pp. 197-202, October 4-6, 2006. Article (CrossRef Link).
22 X. Du, and F. Lin, “Maintaining differentiated coverage in heterogeneous sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2005, no. 4, pp. 565-572, September, 2005. Article (CrossRef Link).   DOI
23 W. Leveque, Elementary theory of numbers, Dover, 1990.
24 D. Liu, and P. Ning, “Multilevel μTESLA: Broadcast authentication for distributed sensor networks,” ACM Transactions on Embedded Computing Systems, vol. 3, no. 4, pp. 800-836, November, 2004. Article (CrossRef Link).   DOI
25 Certicom Research, "Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography," Version 2.0, May, 2009. Article (CrossRef Link).
26 F. K. Cameron and D. G. Patrick, “Digital signature standard (DSS),” U.S. Department of Commerce, FIPS PUB 186-4, 2013.
27 A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: Security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521-534, September, 2002. Article (CrossRef Link).   DOI
28 K. Ren, S. Yu, W. Lou, and Y. Zhang, “Multi-user broadcast authentication in wireless sensor networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4554-4564, October, 2009. Article (CrossRef Link).   DOI
29 L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770-772, November, 1981. Article (CrossRef Link).   DOI
30 H. Alzaid, D. Park, J. G. Nieto, C. Boyd, and E. Foo, “A forward and backward secure key management in wireless sensor networks for pcs/scada,” Sensor Systems and Software, pp. 66-82, 2010. Article (CrossRef Link).
31 C. E. Perkins, and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proc. of 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, February 25-26, 1999. Article (CrossRef Link).
32 E. W. Weisstein, "Circle-circle intersection" MathWorld-A Wolfram Web Resource, Available: http://mathworld.wolfram.com/Circle-CircleIntersection.html. Article (CrossRef Link).