Abstract
With the recent fast growth in the electronics industry and potential customers, communication managements in interactive Wireless Multimedia Sensor Networks (WMSNs) are increasingly ubiquitous, such as retrieving images, audio streams, video streams, and scalar sensor data, etc. However, due to restricted resources and operation in a hostile environment, WMSNs are usually subjected to numerous threats and vulnerable to various attacks. In this paper, we present a Real-time Dynamic Key Management (RDKM), a splay tree-based rekey management, which can efficiently enhance the network security and survivability in the LEACH-like protocol. Compared to other LEACH-like security solutions, our work offers some salient advantages. First, it establishes a real-time rekey mechanism based on the access-triggered splay tree architecture. In the mechanism, the keys will be changed during messages exchanging phase. To the best of our knowledge, RDKM is the first real-time key management for security in WMSNs. Second, it designs and realizes the rekey mechanism based on the splay tree, which can provide dynamic architecture to generate new keys and make the dynamic key management feasible without any overhead. The novel mechanism can efficiently protect the network against attacks from eavesdropping or captured nodes compromise and address challenging security issues of runtime in WMSNs. Experimental analysis shows that our solution has high security levels as well as good performance.
Similar content being viewed by others
References
Akyildiz I, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 5(1):921–960
Bandyopadhyay S, Coyle EJ. “An energy efficient hierarchical clustering algo-rithm for wireless sensor networks”, in Proceeding of IEEE INFOCOM’03, San Francisco, April 2003
Chan H, Perrig A, Song D. “Random key predistribution schemes for sensor networks”. Proc IEEE Symp Security and Privacy, May 2003
Chang RS, Kuo CJ (2006) “An energy-efficient routing mechanism for wireless sensor networks”. Adv Inf Netw Appl (AINA’06) IEEE, 2: 18–20 April 2006 Page(s):5 pp
Chen M, González S, Cao H, Zhang Y, Vuong S. “Enabling low bit-rate and reliable video surveillance over practical wireless sensor networks”. J Supercomput, September 2010
Chen JS, Hong ZW, Wang NC, Jhuang SH. “Efficient cluster head selection methods for wireless sensor networks”. J Netw 5(8), August 2010
Chen M, Kwon T, Mao S, Yuan Y, Leung V (2008) Reliable and energy-efficient routing protocol in dense wireless sensor networks. Int J Sens Netw (IJSNet) 4(1/2):104–117
Chen M, Lai C, Wang H (2011) “Mobile multimedia sensor networks: architecture and routing”. EURASIP J Wirel Commun Netw 2011, doi:10.1186/1687-1499-2011-159
Chen M, Leung V, Mao S (2009) Directional controlled fusion in wireless sensor networks. ACM/Springer Mob Netw Appl (MONET) 14(2):220–229
Chen M, Leung V, Mao S, Xiao Y, Chlamtac I (2009) Hybrid geographical routing for flexible energy-delay trade-offs. IEEE Trans Veh Technol 58(9):4976–4988
Chen M, Leung V, Mao S, Yuan Y (2007) Directional geographical routing for real-time video communications in wireless sensor networks. Elsevier Comput Commun 30(17):3368–3383
Chen M, Yang L, Kwon T, Zhou L, Jo M (2011) Itinerary planning for energy-efficient agent communication in wireless sensor networks. IEEE Trans Veh Technol 60(7):3290–3299
Chen M et al (2011) Body area networks: a survey. ACM/Springer Mob Netw Appl 16(2):171–193
Deng J, Hartung C, Han R, Mishra S (2005) “A practical study of transitory master key establishment for wireless sensor networks”, In 1st IEEE/CreateNet Conference on Security and Privacy in Communication Networks, p289–299
Eltoweissy M, Moharrum M, Mukkamala R (2006) Dynamic key management in sensor networks. IEEE Commun Mag 44(4):122–130
Fanrui K, Chunwen L (2010) Dynamic key management scheme for wireless sensor network. J Softw 21(7):1679–1691, in Chinese
Grieco LA, Boggia G, Sicari S, Colombo P (2009) “Secure wireless multimedia sensor networks: a survey”, ubicomm, pp.194–201, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
Jiang YX, Lin C, Shi MH, Shen XM (2006) Security in sensor networks. Taylor and Francis Group, Oxfordshire, pp 113–143
Jolly G, Kusçu MC, Kokate P, Younis MF. “A low-energy key management protocol for wireless sensor networks”. Proc IEEE Symp Comp Commun: 335, June 2003
Lai R, Chen M. “Mobile multimedia technology for internet of things”. IEEE MMTC Lett 6(9), September 2011
Luk M, Mezzour G, Perrig A, Gligor V. “MiniSec: a secure sensor network communication architecture”, In Proceedings of the Sixth International Conference on Information Processing in Sensor Networks (IPSN 2007), April 2007
Manjeshwar A, Grawal DP (2001) “TEEN: a protocol for enhanced effciency in wireless sensor networks”, the 15th Paralleland Distributed Processing Symp. San Francisco: IEEE Computer Society, 2009–2015
Oliveira LB, Hao C, Wong, Bern M (2006) SecLEACH: a random key distribution solution for securing clustered sensor networks. Fifth IEEE Interna-tional Symposium on Network Computing and Applications
Shu L, Chen M. “Multimedia over sensor networks”. IEEE COMSOC MMTC E-Letter, Sep 2010
Tang W, Chen M, Ni J, Yang X (2011) Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems. Sensors 11(7):6743–6759
Xiong NN, Vasilakos A, Yang LT, Song L, Pan Y, Kannan R, Li Y (2009) Comparative analysis of QoS and memory usage of adaptive failure detectors. IEEE J Sel Areas Commun Spec Issue Wirel Pervasive Commun Healthc 27(4):495–509
Yu Z, Guan Y. “A key management scheme using deployment knowledge for wireless sensor networks”. IEEE Trans Parallel Distrib Syst Arch 19(10), October 2008
Zhang YC, Liu W, Lou WJ, Fang YG (2006) Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J Sel Areas Commun 24(2):247–260
Zhang YY, Park MS, Chao HC, Chen M, SHU L, Park CH. “Outlier detection and countermeasure for hierarchical wireless sensor networks”. IET Inf Secur:361–373, December 2010
Zhang YY, Yang WC, HE L, SHU L. “A hierarchy-based dynamic key management for clustered wireless sensor network”, The 2011 International Conference on Energy Systems and Electrical Power (ESEP 2011)
Zhang YY, Yang WC, Kim KB, Park MS (2008) “An AVL tree-based dynamic key management in hierarchical wireless sensor network”, iih-msp, pp. 298–303, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Zhu S, Setia S, Jajodia S. “LEAP+: efficient security mechanisms for large-scale distributed sensor networks”. ACM Trans Sens Netw (TOSN) 2(4), November 2006
Acknowledgements
This research work was supported by Doctoral Start-up Fund of Liaoling Province (20101074), Liaoning, China. This work was also supported by the foundation: Important National Science & Technology Specific Projects of China: Research, development, and application validation of sensor network for smart grid security monitoring, transmission efficiency, measurement and user interaction (2010ZX03006-005-02); the National Basic Research Program of China (973 Program): Basic theory and practice research of Internet of Things (2011CB302900).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, Y., Li, X., Yang, J. et al. A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimed Tools Appl 67, 97–117 (2013). https://doi.org/10.1007/s11042-012-1054-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1054-8