Advertisement

Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks

  • Hyunsung Kim
Part of the Communications in Computer and Information Science book series (CCIS, volume 339)

Abstract

Wireless sensor networks (WSNs) have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics. Key agreement in WSNs is a critical security issue due to their unattended and hostile deployment. Recently, Guo et al. proposed an efficient and non-interactive hierarchical key agreement protocol applicable to mobile ad-hoc networks. However, their protocol could not be applied to the WSNs as it is due to the WSN’s uniqueness. Thereby, we propose a non-interactive hierarchical key agreement protocol over the hierarchical WSNs. Our revision could support security and robustness over the hierarchical WSNs.

Keywords

Hierarchical key agreement protocol non-interactive protocol security protocol wireless sensor network 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mao, G., Fidan, B., Anderson, B.: Wireless sensor network location techniques. Computer Networks: The International Journal of Computer and Telecommunications Networking 29, 2529–2553 (2007)CrossRefzbMATHGoogle Scholar
  2. 2.
    Arampatzis, T., Lygeros, J., Manesis, S.: A survey of applications of wireless sensor and wireless sensor networks. In: Proceedings of IEEE International Symposium on Mediterrean Conference on Control and Automation, pp. 719–724 (2005)Google Scholar
  3. 3.
    Yuxin, M., Guiyi, W.: A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks. Sensors, 9529–9540 (2010)Google Scholar
  4. 4.
    Culler, D., Estrin, D., Srivastava, M.: Overview of sensor networks. IEEE Comput. 8, 41–49 (2004)CrossRefGoogle Scholar
  5. 5.
    Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, pp. 824–828 (2009)Google Scholar
  6. 6.
    Kadri, B., Moussaoui, D., Feham, M., Mhammed, A.: An efficient key management scheme for hierarchical wireless sensor networks. Wireless Sensor Network 4, 155–161 (2012)CrossRefGoogle Scholar
  7. 7.
    Oliveira, L.B., Dahab, R., Lopez, J., Daguano, F., Loureiro, A.A.F.: Identity-based encryption for sensor networks. In: Proc. of 5th IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 290–294 (2007)Google Scholar
  8. 8.
    Kalyani, P., Chellappan, C.: Enhanced RSACRT for energy efficient authentication to wireless sensor networks security. American Journal of Applied Sciences 9(10), 1660–1667 (2012)CrossRefGoogle Scholar
  9. 9.
    Rosli, R., Yusoff, Y.M., Hashim, H.: A review on pairing based cryptography in wireless sensor networks. In: Proc. of ISWTA 2011, pp. 48–51 (2011)Google Scholar
  10. 10.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Guo, H., Mu, Y., Lin, Z., Zhang, X.: An efficient and non-interactive hierarchical key agreement protocol. Computers & Security 30, 28–34 (2011)CrossRefGoogle Scholar
  12. 12.
    Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S., Wolthusen, S.D.: Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 49–65. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  13. 13.
    Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairings. In: Proc. of Symposium on Cryptography and Information Security 2000 (2000)Google Scholar
  14. 14.
    Kim, H.S.: Location-based authentication protocol for first cognitive radio networking standard. Journal of Network and Computer Applications 34, 1160–1167 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Hyunsung Kim
    • 1
  1. 1.Department of Cyber SecurityKyungil UniversityKyungsansiKorea

Personalised recommendations