An Efficient and Secure Session Key Management Scheme for Cluster Based Wireless Sensors Networks
Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprises of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to well balance between the security level and the associated energy consumption overhead to mitigate the security risks. In this paper, we present an Efficient and Secure Session Key Management Scheme for Cluster-Based Wireless Sensors Networks (ESSKM). The proposed technique based on symmetric key mechanism, provides an improved session key establishment by updating periodically the session key within a cluster, hence avoids different type of attacks from malicious nodes and mitigates the node compromise attack. Finally, through the network simulator tool (NS-2), the security analysis and performance simulation demonstrate that ESSKM not only achieves efficient security, but also provides energy saving with low storage overhead.
KeywordsWireless Sensor Network Session Key Management Security Attacks Cluster
Unable to display preview. Download preview PDF.
- 2.Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for WSNs. In: Proc. of the 33rd Hawaii International Conference on System Sciences, Washington (2000)Google Scholar
- 6.Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, New York, pp. 62–72 (2003)Google Scholar
- 9.Banerjee, P., Jacobson, D., Lahiri, S.N.: Security and performance analysis of a secure clustering protocol for sensor networks. In: Proc. 6th IEEE Intl. Symposium on Network Computing and Applications, pp. 145–152 (2007)Google Scholar
- 10.Ferreira, A.C., Vilaca, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.: On the security of cluster-based communication protocols for wireless sensor networks. In: Proc. 4th IEEE International Conference on Networking (ICNŠ05), pp. 449–458 (2005)Google Scholar
- 11.Chen, J.J.-R., Sahoo, P.K., Sun, P.-T.: Efficient security mechanisms for the distributed wireless sensor networks. In: Proceedings of the IEEE Third International Conference on Information Technology and Applications (ICITA 2005), vol. 2, pp. 62–72 (2005)Google Scholar
- 12.Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. of the 10th Annual Network and Distributed System Security Symposium, California (2003)Google Scholar
- 13.Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)Google Scholar
- 14.NS-2 web site, http://www.isi.edu/nsnam/ns
- 15.Daemen, J., Rijmen, V.: The Design of Rijndael: AES - the Advanced Encryption Standard. Springer-Verlag New York (2002)Google Scholar