Skip to main content

An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks

  • Conference paper
  • 956 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7093))

Abstract

Wireless Sensor Networks consist of several autonomous sensors deployed in a distributed fashion for different purposes like that of wildlife tracing, detection of intruders, environment monitoring etc. Efficient multicast is necessary to scale down the exchange of messages for group communication in sensor networks. However incorporating security in wireless sensor group communication is a huge challenge because of the limited resource availability. In this paper, a decentralized rekeying mechanism based on Logical Key Hierarchy is proposed to secure the efficient Hierarchical Geographic Multicast Routing without affecting its actual performance. The proposed protocol, Secure Hierarchical Geographic Multicast Routing (SHGMR) meets all the security requirements necessary for any kind of secure group communication. This protocol is also efficient in terms of scalability as it uses only O(log 2 n max ) message transmissions, where n max is the size of the largest subgroup among all the HGMR cells.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, E.W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: Survey. Journal of Computer Networks 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Chong, C.Y., Kumar, S.P.: Sensor Networks: Evolution, Opportunities, and Challenges. Proceedings of the IEEE 91(8), 1247–1256 (2003)

    Article  Google Scholar 

  3. Koutsonikolas, D., Das, S.M., Hu, Y.C., Stojmenovic, I.: Hierarchical Geographic Multicast Routing for Wireless Sensor Networks. Journal of Wireless Networks 16(2), 449–466 (2010)

    Article  Google Scholar 

  4. Sanchez, J.A., Ruiz, P.M., Stojmnenovic, I.: GMR: Geographic Multicast Routing for Wireless Sensor Networks. In: The 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications, pp. 20–29 (October 2006)

    Google Scholar 

  5. Das, S.M., Pucha, H., Hu, Y.C.: Distributed Hashing for Scalable Multicast in Wireless Ad Hoc Networks. IEEE Transaction on Parallel and Distributed System 19(3), 347–362 (2008)

    Article  Google Scholar 

  6. Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  7. Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Journal of Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  8. Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)

    Google Scholar 

  9. Wang, Y., Ramamurthy, B.: Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks. In: The Proceeding of IEEE ICC, pp. 3419–3424 (2007)

    Google Scholar 

  10. Pietro, R.D., Mancini, L.V., Law, Y.W., Etalle, S.: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: Proceedings of International Conference on Parallel Processing Workshops, pp. 397–406 (October 2003)

    Google Scholar 

  11. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. Department of Computer Sciences, The Univ. of Texas at Austin, Tech. Rep. TR-97-23 (July 1997)

    Google Scholar 

  12. Wong, C.K., Gouda, M.G., Lam, S.S.: Secure Group Communication using Key Graphs. IEEE/ACM Transaction on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  13. Dondeti, L.R., Mukherjee, S., Samal, A.: A Dual Encryption Protocol for Scalable Secure Multicasting. In: Proceedings of IEEE International Symposium on Computers and Communications (1999)

    Google Scholar 

  14. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)

    Article  Google Scholar 

  15. Popek, G., Kline, C.: Encryption and Secure Computer Networks. ACM Computing Surveys, 331–356 (December 1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Banerjee, P., Mitra, M., Barbhuiya, F.A., Chakraborty, S., Nandi, S. (2011). An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2011. Lecture Notes in Computer Science, vol 7093. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25560-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25560-1_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25559-5

  • Online ISBN: 978-3-642-25560-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics