An Efficient Key Establishment Protocol for Wireless Sensor Networks
Wireless sensor network represents a new perspective for many applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However, due to limited resources of sensors and hostile environments in which they could be deployed, this type of networks is vulnerable to several types of attacks similar to those occurring in ad hoc networks. Therefore, it is necessary to use effective mechanisms to protect this type of network. Cryptography can play an important role in detecting and preventing security attacks. Our contribution is intended for applications using the WSN nodes with low mobility and require a high level of security. Unlike most methods in the literature for specific topologies, our security scheme can cover both the needs of flat and hierarchical topologies. In this paper, we proposed a new lightweight cryptography algorithm based on LEAP+. Simulations results of the proposed model are presented using TOSSIM simulator and the complexity of the protocol is analyzed and compared with other symmetric schemes.
KeywordsWireless sensor network Cryptography Key management Key establishment LEAP+ Performance evaluation
Unable to display preview. Download preview PDF.
- 1.Huang, A.: Security Primitives for Ultra-Low Power Sensor Nodes in Wireless Sensor Networks, Faculty of Engineering, the Built Environment and Information Technology University of Pretoria (2005)Google Scholar
- 2.Gaubatz, G., Kaps, J., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited, Department of Electrical & Computer Engineering Worcester Polytechnic Institute, 100 Institute Road, Worcester, MA 01609, USAGoogle Scholar
- 3.Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks 8(5), 521–534, September 2002Google Scholar
- 6.Lim, C.H.: LEAP++: a robust key establishment scheme for wireless sensor networks. IEEE (2008). doi: 10.1109/ICDCS.Workshops.2008.93
- 7.Wen, H., Luo, J., Zhou, L.: Lightweight and effective detection scheme for node clone attack in wireless sensor networks. IET Wirel. Sens. Syst. 1(3), 137–143 (2011). doi: 10.1049/iet-wss.2010
- 8.Choi, H., Zhu, S., La Porta, T.F.: SET: detecting node clones in Sensor Networks, Department of Computer Science and Engineering, Pennsylvania State UniversityGoogle Scholar
- 9.Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Sensor Networks, North Carolina State UniversityGoogle Scholar
- 10.Wang, Y.-T., Bagrodia, R.: ComSen: a detection system for identifying compromised nodes in wireless sensor networks. In: SECURWARE 2012: The Sixth International Conference on Emerging Security Information, Systems and TechnologiesGoogle Scholar
- 11.Atakli, I.M., Hu, H., Chen, Y., Ku, W.-S., Su, Z.: Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Simulation of Systems Security (SSSS 2008), Ottawa, Canada, April 14–17, 2008Google Scholar
- 12.Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: accurate and scalable simulation of entire tinyos applications. In: SenSys 2003, Los Angeles, California, USA, November 5–7, 2003Google Scholar
- 13.Levis, P., Lee, N.: TOSSIM: a simulator for TinyOS networks, September 17, 2003Google Scholar
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.