Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks

  • Hyunsung Kim
Part of the Communications in Computer and Information Science book series (CCIS, volume 339)


Wireless sensor networks (WSNs) have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics. Key agreement in WSNs is a critical security issue due to their unattended and hostile deployment. Recently, Guo et al. proposed an efficient and non-interactive hierarchical key agreement protocol applicable to mobile ad-hoc networks. However, their protocol could not be applied to the WSNs as it is due to the WSN’s uniqueness. Thereby, we propose a non-interactive hierarchical key agreement protocol over the hierarchical WSNs. Our revision could support security and robustness over the hierarchical WSNs.


Hierarchical key agreement protocol non-interactive protocol security protocol wireless sensor network 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mao, G., Fidan, B., Anderson, B.: Wireless sensor network location techniques. Computer Networks: The International Journal of Computer and Telecommunications Networking 29, 2529–2553 (2007)CrossRefzbMATHGoogle Scholar
  2. 2.
    Arampatzis, T., Lygeros, J., Manesis, S.: A survey of applications of wireless sensor and wireless sensor networks. In: Proceedings of IEEE International Symposium on Mediterrean Conference on Control and Automation, pp. 719–724 (2005)Google Scholar
  3. 3.
    Yuxin, M., Guiyi, W.: A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks. Sensors, 9529–9540 (2010)Google Scholar
  4. 4.
    Culler, D., Estrin, D., Srivastava, M.: Overview of sensor networks. IEEE Comput. 8, 41–49 (2004)CrossRefGoogle Scholar
  5. 5.
    Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, pp. 824–828 (2009)Google Scholar
  6. 6.
    Kadri, B., Moussaoui, D., Feham, M., Mhammed, A.: An efficient key management scheme for hierarchical wireless sensor networks. Wireless Sensor Network 4, 155–161 (2012)CrossRefGoogle Scholar
  7. 7.
    Oliveira, L.B., Dahab, R., Lopez, J., Daguano, F., Loureiro, A.A.F.: Identity-based encryption for sensor networks. In: Proc. of 5th IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 290–294 (2007)Google Scholar
  8. 8.
    Kalyani, P., Chellappan, C.: Enhanced RSACRT for energy efficient authentication to wireless sensor networks security. American Journal of Applied Sciences 9(10), 1660–1667 (2012)CrossRefGoogle Scholar
  9. 9.
    Rosli, R., Yusoff, Y.M., Hashim, H.: A review on pairing based cryptography in wireless sensor networks. In: Proc. of ISWTA 2011, pp. 48–51 (2011)Google Scholar
  10. 10.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Guo, H., Mu, Y., Lin, Z., Zhang, X.: An efficient and non-interactive hierarchical key agreement protocol. Computers & Security 30, 28–34 (2011)CrossRefGoogle Scholar
  12. 12.
    Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S., Wolthusen, S.D.: Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 49–65. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  13. 13.
    Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairings. In: Proc. of Symposium on Cryptography and Information Security 2000 (2000)Google Scholar
  14. 14.
    Kim, H.S.: Location-based authentication protocol for first cognitive radio networking standard. Journal of Network and Computer Applications 34, 1160–1167 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Hyunsung Kim
    • 1
  1. 1.Department of Cyber SecurityKyungil UniversityKyungsansiKorea

Personalised recommendations