Browse > Article
http://dx.doi.org/10.6109/jkiice.2008.12.5.870

A key management scheme for the cluster-based sensor network using polar coordinated  

Hong, Seong-Sik (혜전대학 컴퓨터과)
Ryou, Hwang-Bin (광운대학교 컴퓨터소프트웨어학과)
Abstract
The level of security of most sensor nodes that comprise the sensor networks is low, but because of the low computing power and small storage capacity, it is even very difficult to apply a security algorithm efficiently to the sensor nodes. Therefore, preventing the join of an illegal node to a sensor network is impossible, and the transmitting information is easily exposed and overheard when the transmitting algorithm of the sensor node is hewn. In this paper, we propose a group key management scheme for the sensor network using polar coordinates, so that the sensor nodes can deliver information securely inside a cluster and any illegal node is prevented from joining to the cluster where a sensor network is composed of many clusters. In the proposed scheme, all of the sensor nodes in a cluster set up the authentication keys based on the pivot value provided by the CH. The intensive simulations show that the proposed scheme outperforms the pair-wise scheme in terms of the secure key management and the prevention of the illegal nodes joining to the network.
Keywords
sensor network; cluster; key management scheme;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D.Malan, M.Welsh and M.D.Smith, 'A Public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography', IEEE SECON 2004. 2004
2 D.Liu and P.Ning, 'Establishing pair-wise keys in distributed sensor networks', ACM CCS 2003, Oct. 2003
3 N. Priyantha, A. Miu, H. Balakrishnan and A. Steller, 'The Cricket compass for context-aware mobile application.', In Proceedings of the 7th Annual ACM/IEEE international Conference on Mobile Computing and Networking (MobiCom), pp. 1-14, Jul. 2001
4 J.N.Al-Karaki and A.E.Kamal, 'Routing techniques in wireless sensor networks: A survey', IEEE Personal Communications, 11(6), pp. 6-28, Dec. 2004
5 S.Zhu, S.Setia, and S.Jajodia, 'LEAP: Efficient security mechanisms for large-scale distributed sensor networks', ACM CCS 2003, pp. 62-72. 2003.
6 L.Eschenauer and V.D.Gligor, 'A key-management scheme for distributed sensor networks', ACM CCS 2002, Nov. 2002
7 Chris Karlof Naveen Sastry 'TinySec: A Link Layer Security Architecture for Wireless Sensor Networks', SenSys'04, Nov. 2004
8 Y.Hu and A.Perrig, 'A survey of secure wireless ad hoc routing', IEEE Security & Privacy, May/June, pp. 28-39, 2004   DOI   ScienceOn
9 H. Balakrishnan, R. Baliga, D. Curtis, M. Goraczko, A. Miu, N. Priyantha, A. Smith, K. Steele, S. Steller and K. Wang, 'Lesson From developing and deploying the cricket indoor location system', preprint, Nov. 2003
10 나재훈, 채기준, 정교일, '센서 네트워크 보안 연구 동향', 전자통신동향분석, 제20권, 제1호, pp. 112-122, 2005년 2월
11 W.Du, J.Deng, Y.Han and P.K.Varshney, 'A pair-wise key pre-distribution scheme for wireless sensor networks', ACM CCS 2003, pp. 27-30, October 2003
12 J. Deng, R. Han, and S. Mishra, 'Security Support for In-Network Processing in Wireless Sensor Networks,' Proc. of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks(SASN), 200
13 R. Merkle. 'Protocols for public key cryptosystems. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pp 122-134, Apr. 1980