Skip to main content

Key Management Scheme in Cluster for WSNs

  • Conference paper
  • 1158 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 355))

Abstract

The information security of wireless sensor networks is one of the hot issues on the current research; this chapter combines threshold key scheme with the management of security key sharing and group agreement and proposes dynamic key management scheme through clustering level key matrix of authentication mechanism from the cluster to node. The network is divided into different clusters, and the cluster head conducts the key authentication exchange and updates the key management with threshold key schemes, with no need of third authentication center; it reduces computing and communication costs, using the preset public key encrypting the data. The clusters adopt bidirectional authentication to promote communication security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput Netw. 2002;38:393–433.

    Article  Google Scholar 

  2. Pamo B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: Proceedings of the IEEE symposium on security and privacy. IEEE Computer Society; 2005. p. 49–63.

    Google Scholar 

  3. Perrig A, Szewczyk R, Wen V, Culler D, Tygar J.D. SPINS: security protocols for sensor networks. Wirel Netw. 2002;8(5):521–34.

    Google Scholar 

  4. Chan H, Perrig A, Song D. Key distribution techniques for sensor networks. Wirel Netw. 2004;6(2):277–303.

    Google Scholar 

  5. Liu DG, Ning P. Multi-level μTESLA: a broadcast authentication system for distributed sensor networks. ACM (TECS). 2004;3(4):800–36.

    MathSciNet  Google Scholar 

  6. Shen Y-L, Pei Q-Q. MMμTESLA: broadcast authentication protocol for multiple-base-station sensor networks. Chin J Comput. 2007;4:539–47.

    Google Scholar 

  7. Qian S. A novel key pre-distribution for wireless sensor networks. Physics Procedia. 2012;25:2183–9.

    Article  Google Scholar 

  8. Si LL, Ji Z. The application of symmetric key cryptographic algorithms in wireless sensor networks. Physics Procedia. 2012;25:552–9.

    Article  Google Scholar 

  9. Du WL, Deng J, et al. A key management scheme for wireless sensor networks using deployment knowledge. In: The 23th IEEE computer and communications proceedings. IEEE; 2004. p. 586–97.

    Google Scholar 

  10. Levi A, Tasc SE, et al. Simple extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools. J Intell Manuf. 2009;21(5):625–45.

    Google Scholar 

  11. Jaworski J, Ren M, Rybarczyk K. Random key redistribution for wireless sensor networks using deployment knowledge. Computing. 2009;85(1–2):57–76.

    Article  MathSciNet  MATH  Google Scholar 

  12. Wen T, Zhang Y, Quan G, Li F. Kun. Dynamic group key management scheme for homogeneous wireless sensor networks. Journal on Communications. 2012;33(6):164–172.

    Google Scholar 

  13. Paek K, Song U, Kim H, Kim J. Energy-efficient key-management (EEKM) protocol for large-scale distributed sensor networks. J Inf Sci Eng. 2008;24(6):1837.

    MathSciNet  Google Scholar 

  14. Wei L, Rong L. A lightweight key establishment protocol for wireless sensor networks. J Electron Inf Technol. 2010;32:869–74.

    Article  MATH  Google Scholar 

  15. Liu YN, Wang J, et al. Threshold key sharing Model in wireless sensor networks. J Electron Inf Technol. 2011;33:1913–9.

    Article  Google Scholar 

  16. He X, Niedermeier M. Dynamic key management in wireless sensor networks: a survey. J Netw Comput Appl. 2013;36:611–22.

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by China National Foundation No. 61103017, Lianyungang Science and Technology Project No. CG1215, and Lianyungang Social Development Project No. SH1212.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoming Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, X., Zhao, Q. (2015). Key Management Scheme in Cluster for WSNs. In: Wong, W. (eds) Proceedings of the 4th International Conference on Computer Engineering and Networks. Lecture Notes in Electrical Engineering, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-11104-9_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11104-9_31

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11103-2

  • Online ISBN: 978-3-319-11104-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics