Skip to main content

Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks

  • Conference paper
Mobile Communication and Power Engineering (AIM 2012)

Abstract

This paper proposes a Cluster Based Dynamic Keying Technique (CBDKT) for authentication in wireless sensor networks. The Cluster Head (CH) determines a Combined Cost Value (CCV) for each sensor node based on node location, node degree and residual battery power. Since the key to the encryption scheme changes dynamically when there is a change in CCV, separate dynamic keys are generated in each cluster by the CH. While the source CH forwards the data to the sink along different clusters, verification of authenticity is done. When the source CH needs to transmit the aggregated data packet to the sink, it splits the packet into shares by threshold secret sharing algorithm and forwards them to the sink using multi-path dispersal routing technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, Y.: Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks. In: Global Communications Conference, GLOBECOM 2009, Honolulu, Hawaii, USA, pp. 1–6. IEEE (2009)

    Google Scholar 

  2. Bojkovic, Z.S., Bakmaz, B.M., Bakmaz, M.R.: Security Issues in Wireless Sensor Networks. International Journal of Communications 2(1), 106–115 (2008)

    Google Scholar 

  3. Clark, J.A., Murdoch, J., McDermid, J.A., Sen, S., Chivers, H.R., Worthington, O., Rohatgi, P.: Threat Modelling for Mobile Ad Hoc and Sensor Networks. In: Annual Conference of ITA, September 25-27 (2007)

    Google Scholar 

  4. Vaidya, B., Chen, M., Rodrigues, J.J.P.C.: Improved Robust User Authentication Scheme for Wireless Sensor Networks. In: Fifth IEEE Conference on Wireless Communication and Sensor Networks (WCSN 2009), Allahabad, India, pp. 1–6 (2009)

    Google Scholar 

  5. Benenson, Z., Gedicke, N., Raivio, O.: Realizing Robust User Authentication in Sensor Networks. In: Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Sweden (2005)

    Google Scholar 

  6. Xiong, X., Wong, D.S., Deng, X.: TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. In: Eighth IEEE International Symposium on Network Computing and Applications (NCA 2009), Cambridge, MA, USA, pp. 187–194 (2009)

    Google Scholar 

  7. Moon, S.Y., Cho, T.H.: Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks. IJCSNS International Journal of Computer Science and Network Security 9(7), 118–122 (2009)

    Google Scholar 

  8. Qiu, Y., Zhou, J., Baek, J., Lopez, J.: Authentication and Key Establishment in Dynamic Wireless Sensor Networks. Sensors 10(4), 3718–3731 (2010)

    Article  Google Scholar 

  9. Du, X., Guizani, M., Xiao, Y., Chen, H.: A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks. IEEE Transactions on Wireless Communications 8(3), 1223–1229 (2009)

    Article  Google Scholar 

  10. Uluagac, A.S., Beyah, R.A., Li, Y., Copeland, J.A.: VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks. IEEE Transactions on Mobile Computing 9(7), 994–1007 (2010)

    Article  Google Scholar 

  11. Yu, C.-M., Tsou, Y.-T., Lu, C.-S., Kuo, S.-Y.: Constrained Function-Based Message Authentication for Sensor Networks. IEEE Transactions on Information Forensics and Security 6(2), 407–425 (2011)

    Article  Google Scholar 

  12. Rivest, R.L.: The RC5 Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  13. Stoleru, R., Stankovic, J.A.: Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks. In: 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON), Santa Clara, CA, pp. 430–438 (2004)

    Google Scholar 

  14. Shamir, A.: How to share a secret. Communications of the ACM (CACM) 22(11) (November 1979)

    Google Scholar 

  15. Han, X., Cao, X., Lloyd, E.L., Shen, C.-C.: Fault-tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks. In: 26th IEEE International Conference on Computer Communications (INFOCOM), pp. 1667–1675 (2007)

    Google Scholar 

  16. Shirase, M., Miyazaki, Y., Takagi, T., Han, D.-G., Choi, D.: Efficient implementation of pairing based cryptography on a sensor node. IEICE Trans. E92-D, 909–917 (2009)

    Google Scholar 

  17. Lu, X., Spear, M., Levitt, K., Felix Wu, S.: iBubble: Multi-keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. In: IEEE, 27th Conference on Computer Communications (INFOCOM), pp. 968–976 (2008)

    Google Scholar 

  18. Qiu, M., Xue, C., Shao, Z., Liu, M., Sha, E.H.-M.: Energy Minimization for Heterogeneous Wireless Sensor Network. Special Issue of Journal of Embedded Computing (JEC) 3(2), 109–117 (2009)

    Google Scholar 

  19. Chen, C.-L., Li, C.-T.: Dynamic Session-Key Generation for Wireless Sensor Networks. EURASIP Journal on Wireless Communications and Networking  2008, Article ID 691571, 10 pages (2008)

    Google Scholar 

  20. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)

    Article  Google Scholar 

  21. Dasika, S., Vrudhula, S., Chopra, K., Srinivasan, R.: A framework for battery-aware sensor management. In: The Conference on Design, Automation and Test in Europe, vol. 2, pp. 962–967. IEEE Computer Society, Washington, DC (2004)

    Chapter  Google Scholar 

  22. Yahya, B., Ben-Othman, J.: REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks. In: Global Telecommunications Conference (IEEE GLOBECOM 2009), Honolulu, HI, pp. 1–7 (2009)

    Google Scholar 

  23. Quan, S.G., Kim, Y.Y.: Fast Data Aggregation Algorithm for Minimum Delay in Clustered Ubiquitous Sensor Networks. In: International Conference on Convergence and Hybrid Information Technology (ICHIT 2008), Daejeon, pp. 327–333 (2008)

    Google Scholar 

  24. Network Simulator, http://www.isi.edu/nsnam/ns

  25. Huang, D., Teng, W., Wang, C., Huang, H., Hellerstein, J.M.: Clock Skew Based Node Identification in Wireless Sensor Networks. In: Global Telecommunications Conference (IEEE GLOBECOM 2008), New Orleans, LO, pp. 1–5 (2008)

    Google Scholar 

  26. Ou, G., Huang, J., Juan Li, J.: A Key-Chain Based Key Management Scheme for Heterogeneous Sensor Network. In: IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, pp. 358–361 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

V., T.K., S., R. (2013). Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks. In: Das, V.V., Chaba, Y. (eds) Mobile Communication and Power Engineering. AIM 2012. Communications in Computer and Information Science, vol 296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35864-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35864-7_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35863-0

  • Online ISBN: 978-3-642-35864-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics