Abstract
The information security of wireless sensor networks is one of the hot issues on the current research; this chapter combines threshold key scheme with the management of security key sharing and group agreement and proposes dynamic key management scheme through clustering level key matrix of authentication mechanism from the cluster to node. The network is divided into different clusters, and the cluster head conducts the key authentication exchange and updates the key management with threshold key schemes, with no need of third authentication center; it reduces computing and communication costs, using the preset public key encrypting the data. The clusters adopt bidirectional authentication to promote communication security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput Netw. 2002;38:393–433.
Pamo B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: Proceedings of the IEEE symposium on security and privacy. IEEE Computer Society; 2005. p. 49–63.
Perrig A, Szewczyk R, Wen V, Culler D, Tygar J.D. SPINS: security protocols for sensor networks. Wirel Netw. 2002;8(5):521–34.
Chan H, Perrig A, Song D. Key distribution techniques for sensor networks. Wirel Netw. 2004;6(2):277–303.
Liu DG, Ning P. Multi-level μTESLA: a broadcast authentication system for distributed sensor networks. ACM (TECS). 2004;3(4):800–36.
Shen Y-L, Pei Q-Q. MMμTESLA: broadcast authentication protocol for multiple-base-station sensor networks. Chin J Comput. 2007;4:539–47.
Qian S. A novel key pre-distribution for wireless sensor networks. Physics Procedia. 2012;25:2183–9.
Si LL, Ji Z. The application of symmetric key cryptographic algorithms in wireless sensor networks. Physics Procedia. 2012;25:552–9.
Du WL, Deng J, et al. A key management scheme for wireless sensor networks using deployment knowledge. In: The 23th IEEE computer and communications proceedings. IEEE; 2004. p. 586–97.
Levi A, Tasc SE, et al. Simple extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools. J Intell Manuf. 2009;21(5):625–45.
Jaworski J, Ren M, Rybarczyk K. Random key redistribution for wireless sensor networks using deployment knowledge. Computing. 2009;85(1–2):57–76.
Wen T, Zhang Y, Quan G, Li F. Kun. Dynamic group key management scheme for homogeneous wireless sensor networks. Journal on Communications. 2012;33(6):164–172.
Paek K, Song U, Kim H, Kim J. Energy-efficient key-management (EEKM) protocol for large-scale distributed sensor networks. J Inf Sci Eng. 2008;24(6):1837.
Wei L, Rong L. A lightweight key establishment protocol for wireless sensor networks. J Electron Inf Technol. 2010;32:869–74.
Liu YN, Wang J, et al. Threshold key sharing Model in wireless sensor networks. J Electron Inf Technol. 2011;33:1913–9.
He X, Niedermeier M. Dynamic key management in wireless sensor networks: a survey. J Netw Comput Appl. 2013;36:611–22.
Acknowledgements
This research was supported by China National Foundation No. 61103017, Lianyungang Science and Technology Project No. CG1215, and Lianyungang Social Development Project No. SH1212.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, X., Zhao, Q. (2015). Key Management Scheme in Cluster for WSNs. In: Wong, W. (eds) Proceedings of the 4th International Conference on Computer Engineering and Networks. Lecture Notes in Electrical Engineering, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-11104-9_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-11104-9_31
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11103-2
Online ISBN: 978-3-319-11104-9
eBook Packages: EngineeringEngineering (R0)