Abstract
This paper proposes a Cluster Based Dynamic Keying Technique (CBDKT) for authentication in wireless sensor networks. The Cluster Head (CH) determines a Combined Cost Value (CCV) for each sensor node based on node location, node degree and residual battery power. Since the key to the encryption scheme changes dynamically when there is a change in CCV, separate dynamic keys are generated in each cluster by the CH. While the source CH forwards the data to the sink along different clusters, verification of authenticity is done. When the source CH needs to transmit the aggregated data packet to the sink, it splits the packet into shares by threshold secret sharing algorithm and forwards them to the sink using multi-path dispersal routing technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, Y.: Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks. In: Global Communications Conference, GLOBECOM 2009, Honolulu, Hawaii, USA, pp. 1–6. IEEE (2009)
Bojkovic, Z.S., Bakmaz, B.M., Bakmaz, M.R.: Security Issues in Wireless Sensor Networks. International Journal of Communications 2(1), 106–115 (2008)
Clark, J.A., Murdoch, J., McDermid, J.A., Sen, S., Chivers, H.R., Worthington, O., Rohatgi, P.: Threat Modelling for Mobile Ad Hoc and Sensor Networks. In: Annual Conference of ITA, September 25-27 (2007)
Vaidya, B., Chen, M., Rodrigues, J.J.P.C.: Improved Robust User Authentication Scheme for Wireless Sensor Networks. In: Fifth IEEE Conference on Wireless Communication and Sensor Networks (WCSN 2009), Allahabad, India, pp. 1–6 (2009)
Benenson, Z., Gedicke, N., Raivio, O.: Realizing Robust User Authentication in Sensor Networks. In: Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Sweden (2005)
Xiong, X., Wong, D.S., Deng, X.: TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. In: Eighth IEEE International Symposium on Network Computing and Applications (NCA 2009), Cambridge, MA, USA, pp. 187–194 (2009)
Moon, S.Y., Cho, T.H.: Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks. IJCSNS International Journal of Computer Science and Network Security 9(7), 118–122 (2009)
Qiu, Y., Zhou, J., Baek, J., Lopez, J.: Authentication and Key Establishment in Dynamic Wireless Sensor Networks. Sensors 10(4), 3718–3731 (2010)
Du, X., Guizani, M., Xiao, Y., Chen, H.: A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks. IEEE Transactions on Wireless Communications 8(3), 1223–1229 (2009)
Uluagac, A.S., Beyah, R.A., Li, Y., Copeland, J.A.: VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks. IEEE Transactions on Mobile Computing 9(7), 994–1007 (2010)
Yu, C.-M., Tsou, Y.-T., Lu, C.-S., Kuo, S.-Y.: Constrained Function-Based Message Authentication for Sensor Networks. IEEE Transactions on Information Forensics and Security 6(2), 407–425 (2011)
Rivest, R.L.: The RC5 Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Heidelberg (1995)
Stoleru, R., Stankovic, J.A.: Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks. In: 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON), Santa Clara, CA, pp. 430–438 (2004)
Shamir, A.: How to share a secret. Communications of the ACM (CACM)Â 22(11) (November 1979)
Han, X., Cao, X., Lloyd, E.L., Shen, C.-C.: Fault-tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks. In: 26th IEEE International Conference on Computer Communications (INFOCOM), pp. 1667–1675 (2007)
Shirase, M., Miyazaki, Y., Takagi, T., Han, D.-G., Choi, D.: Efficient implementation of pairing based cryptography on a sensor node. IEICE Trans. E92-D, 909–917 (2009)
Lu, X., Spear, M., Levitt, K., Felix Wu, S.: iBubble: Multi-keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. In: IEEE, 27th Conference on Computer Communications (INFOCOM), pp. 968–976 (2008)
Qiu, M., Xue, C., Shao, Z., Liu, M., Sha, E.H.-M.: Energy Minimization for Heterogeneous Wireless Sensor Network. Special Issue of Journal of Embedded Computing (JEC) 3(2), 109–117 (2009)
Chen, C.-L., Li, C.-T.: Dynamic Session-Key Generation for Wireless Sensor Networks. EURASIP Journal on Wireless Communications and Networking  2008, Article ID 691571, 10 pages (2008)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)
Dasika, S., Vrudhula, S., Chopra, K., Srinivasan, R.: A framework for battery-aware sensor management. In: The Conference on Design, Automation and Test in Europe, vol. 2, pp. 962–967. IEEE Computer Society, Washington, DC (2004)
Yahya, B., Ben-Othman, J.: REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks. In: Global Telecommunications Conference (IEEE GLOBECOM 2009), Honolulu, HI, pp. 1–7 (2009)
Quan, S.G., Kim, Y.Y.: Fast Data Aggregation Algorithm for Minimum Delay in Clustered Ubiquitous Sensor Networks. In: International Conference on Convergence and Hybrid Information Technology (ICHIT 2008), Daejeon, pp. 327–333 (2008)
Network Simulator, http://www.isi.edu/nsnam/ns
Huang, D., Teng, W., Wang, C., Huang, H., Hellerstein, J.M.: Clock Skew Based Node Identification in Wireless Sensor Networks. In: Global Telecommunications Conference (IEEE GLOBECOM 2008), New Orleans, LO, pp. 1–5 (2008)
Ou, G., Huang, J., Juan Li, J.: A Key-Chain Based Key Management Scheme for Heterogeneous Sensor Network. In: IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, pp. 358–361 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
V., T.K., S., R. (2013). Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks. In: Das, V.V., Chaba, Y. (eds) Mobile Communication and Power Engineering. AIM 2012. Communications in Computer and Information Science, vol 296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35864-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-35864-7_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35863-0
Online ISBN: 978-3-642-35864-7
eBook Packages: Computer ScienceComputer Science (R0)