Advertisement

An Efficient and Secure Session Key Management Scheme for Cluster Based Wireless Sensors Networks

  • Abdoulaye Diop
  • Yue Qi
  • Qin Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8351)

Abstract

Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprises of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to well balance between the security level and the associated energy consumption overhead to mitigate the security risks. In this paper, we present an Efficient and Secure Session Key Management Scheme for Cluster-Based Wireless Sensors Networks (ESSKM). The proposed technique based on symmetric key mechanism, provides an improved session key establishment by updating periodically the session key within a cluster, hence avoids different type of attacks from malicious nodes and mitigates the node compromise attack. Finally, through the network simulator tool (NS-2), the security analysis and performance simulation demonstrate that ESSKM not only achieves efficient security, but also provides energy saving with low storage overhead.

Keywords

Wireless Sensor Network Session Key Management Security Attacks Cluster 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2), 63–75 (2010)CrossRefGoogle Scholar
  2. 2.
    Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for WSNs. In: Proc. of the 33rd Hawaii International Conference on System Sciences, Washington (2000)Google Scholar
  3. 3.
    Modirkhazeni, A., Ithnin, N., Ibrahim, O.: Empirical Study on Secure Routing Protocols in Wireless Sensor Networks. International Journal of Advancements in Computing Technology 2(5), 25–41 (2010)CrossRefGoogle Scholar
  4. 4.
    Lee, J., Leung, V., Wong, K., Cao, J., Chan, H.: Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications 14(5), 76–84 (2007)CrossRefGoogle Scholar
  5. 5.
    Otway, D., Rees, O.: Efficient and Timely Mutual Authentication. Operating Systems Review 21, 8–10 (1987)CrossRefGoogle Scholar
  6. 6.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, New York, pp. 62–72 (2003)Google Scholar
  7. 7.
    Cheng, Y., Agrawal, D.: An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks (Elsevier) 5(1), 35–48 (2007)CrossRefGoogle Scholar
  8. 8.
    Oliveira, L.B., Ferreira, A., Vilaca, M.A., et al.: SecLEACH-on the security of clustered sensor networks. Signal Processing 87(12), 2882–2895 (2007)CrossRefzbMATHGoogle Scholar
  9. 9.
    Banerjee, P., Jacobson, D., Lahiri, S.N.: Security and performance analysis of a secure clustering protocol for sensor networks. In: Proc. 6th IEEE Intl. Symposium on Network Computing and Applications, pp. 145–152 (2007)Google Scholar
  10. 10.
    Ferreira, A.C., Vilaca, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.: On the security of cluster-based communication protocols for wireless sensor networks. In: Proc. 4th IEEE International Conference on Networking (ICNŠ05), pp. 449–458 (2005)Google Scholar
  11. 11.
    Chen, J.J.-R., Sahoo, P.K., Sun, P.-T.: Efficient security mechanisms for the distributed wireless sensor networks. In: Proceedings of the IEEE Third International Conference on Information Technology and Applications (ICITA 2005), vol. 2, pp. 62–72 (2005)Google Scholar
  12. 12.
    Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. of the 10th Annual Network and Distributed System Security Symposium, California (2003)Google Scholar
  13. 13.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)Google Scholar
  14. 14.
  15. 15.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES - the Advanced Encryption Standard. Springer-Verlag New York (2002)Google Scholar
  16. 16.
    Cam, H., Ozdemir, S., Nair, P., Muthuavinashiappan, D., Sanli, H.O.: Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications 29(4), 446–455 (2006)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Abdoulaye Diop
    • 1
  • Yue Qi
    • 1
  • Qin Wang
    • 1
  1. 1.School of Computer and Communication EngineeringUniversity of Science and Technology BeijingBeijingChina

Personalised recommendations