Abstract
With the rapid development of the Internet of things (IoT), the wireless sensor network (WSN) as the most fundamental layer of the network is widely applied to the IoT, and more researchers focus on the security of WSN. Intrusion Detection System (IDS) is an important element in the security of computer system and smart devices. In this paper, a key management scheme which designed for WSN and based on area management is proposed under the premise that the system has IDS, and the scheme divides network into a number of non-overlapping hexagonal areas. In our scheme, two different key management modes are used for inter-regional and intra-regional communication respectively, and the certificates and keys of gateway node and cluster-head node can be efficiently managed by introducing the security gateway. The scheme not only can reduce the complexity of computation and storage effectively, but also improve the communication security and network connectivity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yu, B., Zhou, W., Bin, Y., et al.: ZigBee model for detection and suppression of same-frequency attacks. J. Electron. Inf. Technol. 37(9), 2211–2217 (2015)
Lotfallahtabrizi, P., Morgan, Y.: A novel host intrusion detection system using neural network. In: Computing and Communication Workshop and Conference, pp. 124–130. IEEE (2018)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 197–213. IEEE (2003)
Du, W., Deng, J., Han, Y.S., et al.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004: Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, Hongkong, pp. 586–597. IEEE (2004)
Huang, D., Mehta, M., van de Liefvoort, A., et al.: Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. IEEE/ACM Trans. Netw. 15(5), 1204–1215 (2007)
Wang, H., Yang, J., Wang, P., Tu, P.: Efficient pairwise key establishment scheme based on random pre-distribution keys in WSN. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, Bernady O. (eds.) ICCSA 2010. LNCS, vol. 6018, pp. 291–304. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12179-1_26
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39757-4_22
Hussain, A.W., Ibrahem, M.K.: An efficient pairwise and group key management scheme for wireless sensor network. Int. J. Enhanc. Res. Sci. Technol. Eng. 1(4), 25–31 (2015)
Du, W., Deng, J., Han, Y.S., et al.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(2), 228–258 (2005)
Blundo, C., Santis, A.D., Herzberg, A.: Perfectly-secure key distribution for dynamic conferences. Inf. Computat. 146(1), 1–23 (1998)
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: ACM Conference on Computer and Communications Security, Dallas, USA, pp. 62–72. ACM (2003)
Jiang, R., Luo, J., Wang, X.: HRKT: a hierarchical route key tree based group key management for wireless sensor networks. KSII Trans. Internet Inf. Syst. 7(7), 2042–2060 (2013)
Jiang, R., Luo, J., Wang, X.: A logic-route key tree based group key management scheme for wireless sensor networks. In: 2013 IEEE/CIC International Conference on Communications in China (ICCC), Xi’an, pp. 686–691. IEEE Computer Society (2013)
Du, Y., Zhang, Y., Li, M., et al.: Optimization method of intrusion detection sample data based on improved FastICA algorithm. J. Commun. 37(1), 42–48 (2016)
Zhao, S., Zhang, Z.: Research on regular hexagon node coverage model of wireless sensor network. Comput. Eng. 36(20), 113–115+118 (2010)
Manikandan, G., Sakthi, U.: A comprehensive survey on various key management schemes in WSN. In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, pp. 378–383 (2018)
Gautam, A.K., Kumar, R.: A comparative study of recently proposed key management schemes in wireless sensor network. In: 2018 International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, Uttar Pradesh, India, pp. 512–517 (2018)
Bechkit, W., Challal, Y., Bouabdallah, A.: A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans. Wirel. Commun. 12(2), 948–959 (2013)
Chakavarika, T.T., Chaurasia, B.K., Gupta, S.K.: Performance evaluation of a polynomial based key management scheme in wireless sensor networks. In: 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, pp. 2114–2118 (2016)
Kamble, S.B., Jog, V.V.: Efficient key management for dynamic wireless sensor network. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT), Bangalore, pp. 583–586 (2017)
Ahlawat, P., Dave, M.: An improved hybrid key management scheme for wireless sensor networks. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, pp. 253–258 (2016)
Msolli, A., Ameur, H.: A new secure key management scheme for wireless sensor network. In: 2017 International Conference on Control, Automation and Diagnosis (ICCAD), Hammamet, pp. 254–257 (2017)
Prema, S., Pramod, T.C.: Key establishment scheme for intra and inter cluster communication in WSN. In: 2018 Second International Conference on Computing Methodologies and Communication (ICCMC), Erode, pp. 942–944 (2018)
Patel, J.S., Chavda, V.M.: Security vulnerability and robust security requirements using key management in sensor network. Int. J. Grid Distrib. Comput. 7(3), 23–28 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Han, Y., He, Y., Liu, P., Yan, X., Li, N. (2019). A Hybrid Key Management Scheme for Wireless Sensor Network. In: Shen, B., Wang, B., Han, J., Yu, Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://doi.org/10.1007/978-981-15-0818-9_22
Download citation
DOI: https://doi.org/10.1007/978-981-15-0818-9_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0817-2
Online ISBN: 978-981-15-0818-9
eBook Packages: Computer ScienceComputer Science (R0)