Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN

  • Alyaa Amer
  • Ayman Abdel-Hamid
  • Mohamad Abou El-Nasr
Part of the Communications in Computer and Information Science book series (CCIS, volume 381)


It has been greatly acknowledged the emergence of the wireless sensor network (WSN) in many applications such as military, environmental and health applications. However, mobile agents have provided flexibility and customizability to overcome some of the WSN constraints such as limitation in power, computational capacities and memory through agent migration from node to node. Security is a crucial concern when it comes to mobile agents, due to threats from malicious hosts and other mobile agents, where the use of symmetric and asymmetric keys has been adopted to provide authentication and confidentiality. The use of asymmetric keys is nowadays feasible due to advances in WSN hardware. In this paper, Chord (A scalable peer to peer lookup service) is used for storing and looking up public keys in a clustered mobile agent WSN to protect sensor nodes from malicious agents. Cluster heads act as a distributed key storage and lookup facility forming a ring overlay network. Performance evaluation results through network simulation show that the proposed scheme provides efficiency and scalability in terms of key storage and lookup.


Wireless Sensor Networks Chord Code Signing Key Lookup Mobile Agent Distributed Hash Table 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Henricksen, K., Robinson, R.: A survey of middleware for sensor networks: State-of-the-art and future directions. In: Proceedings of the International Workshop on Middleware for Sensor Networks, pp. 60–65 (2006)Google Scholar
  2. 2.
    Tong, S.: An evaluation framework for middleware approaches on wireless sensor networks.Technical report, Helsinki University of Technology (2009),
  3. 3.
    Chen, M., Kwon, T., Yuan, Y., Leung, V.C.M.: Mobile Agent Based Wireless Sensor Networks. Journal of Computers 1(1), 14–21 (2006)CrossRefGoogle Scholar
  4. 4.
    Qi, H., Iyengar, S.S., Chakrabarty, K.: Multiresolution data integration using mobile agents in distributed sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 31(3), 383–391 (2001)CrossRefGoogle Scholar
  5. 5.
    Daniel, T.: Cogent computing: information extraction from large-scale wsns- a complex querying perspective. Technical report number COGENT.002, Coventry university (2008)Google Scholar
  6. 6.
    Fok, C.-L., Roman, G., Lu, C.: Mobile agent middleware for sensor networks: an application case study. In: Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, pp. 382–387 (2005)Google Scholar
  7. 7.
    Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 17–32 (2003)Google Scholar
  8. 8.
    Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: Mobile Agent Middleware for Autonomic Data Fusion in Wireless Sensor Networks. In: Autonomic Computing and Networking, pp. 57–81 (2009)Google Scholar
  9. 9.
    Chen, M., Gonzalez, S., Leung, V.C.M.: Applications and design issues for mobile agents in wireless sensor networks. IEEE Trans. on Wireless Communications 14, 20–26 (2007)Google Scholar
  10. 10.
    Fok, C.-L.: A mobile agent middleware for wireless sensor networks (2008),
  11. 11.
    Baumann, J., Hohl, F., Radouniklis, N., Rothermel, K., Straβer, M.: Communication Concepts for Mobile Agent Systems. In: Rothermel, K., Popescu-Zeletin, R. (eds.) MA 1997. LNCS, vol. 1219, pp. 123–135. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  12. 12.
    Vijil, E.C.: Security issues in mobile agents. Master’s thesis, Indian Institute of Technology, Bombay (2002),
  13. 13.
    Sharma, S., Patheja, P.S., Waoo, A.A., Gour, R.: A survey on different security techniques of mobile code. International Journal of Engineering and Advanced Technology (IJEAT) 1(1) (2011)Google Scholar
  14. 14.
    Borselius, N.: Mobile agent security. IEEE Electronics and Communication Engineering Journal 14(5), 211–218 (2002)CrossRefGoogle Scholar
  15. 15.
    Wander, A.S., Gura, N., Eberle, H., Gupta, V.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, PerCom, pp. 324–328 (2005)Google Scholar
  16. 16.
    Baqer, M., Khan, A.I., Baig, Z.A.: Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC Workshops 2005. LNCS, vol. 3823, pp. 208–217. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  17. 17.
    Yu, J., Liu, W., Song, J.: C2WSN: A two-tier chord overlay serving for efficient queries in large-scale wireless sensor networks. In: International Conference on Advanced Computing and Communications, ADCOM 2007, pp. 237–242 (2007)Google Scholar
  18. 18.
    Ali, M., Uzmi, Z.A.: Csn: a network protocol for serving dynamic queries in large-scale wireless sensor networks. In: Second Annual Conference on Communication Networks and Services Research, May 19-21, pp. 165–174 (2004)Google Scholar
  19. 19.
    Zhang, F., Shi, Z.J., Wang, B.: Chord-based key establishment schemes for sensor networks. In: Fifth International Conference on Information Technology: New Generations, ITNG 2008, pp. 731–737 (2008)Google Scholar
  20. 20.
    Usman, M., Muthukkumarasamy, V., Wu, X.-W., Khanum, S.: Securing mobile agent based wireless sensor network applications on middleware. In: International Conference on Communications and Information Technologies (ISCIT), October 2-5, pp. 707–712 (2012)Google Scholar
  21. 21.
    Fok, C.-L., Roman, G.-C., Lu, C.: Agilla: A mobile agent middleware for self-adaptive wireless sensor networks. ACM Trans. Auton. Adapt. Syst. 4, 16:1–16:16 (2009)Google Scholar
  22. 22.
    Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, ISLPED 2003, August 25-27, pp. 30–35 (2003)Google Scholar
  23. 23.
    Jansma, N., Arrendondo, B.: Performance Comparison of Elliptic Curve and RSA Digital Signatures; Technical Report; University of Michigan, Ann Arbor, MI, USA (2004)Google Scholar
  24. 24.
    Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self-protected mobile agents. In: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, vol. (1), pp. 362–367 (2004)Google Scholar
  25. 25.
    Ismail, L.: A secure mobile agents platform. Journal of Communications 3(2) (2008)Google Scholar
  26. 26.
    Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 169–176 (2006)Google Scholar
  27. 27.
    Meulenaer, G., Gosset, F., Standaert, O.-X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2008, pp. 580–585 (2008)Google Scholar
  28. 28.
    Taylor, I.: AgentJ Java Network Simulations in NS-2. A Protean Research Group Project Naval Research Laboratory (2010),

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Alyaa Amer
    • 1
  • Ayman Abdel-Hamid
    • 2
  • Mohamad Abou El-Nasr
    • 1
  1. 1.College of Engineering and TechnologyEgypt
  2. 2.College of Computing and Information TechnologyArab Academy for Science, Technology and Maritime TransportAlexandriaEgypt

Personalised recommendations