Skip to main content

An Improved Key Management Scheme with High Security in Wireless Sensor Networks

  • Chapter
  • First Online:

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 70))

Abstract

Security becomes extremely important, when wireless sensor networks are deployed in a hostile environment. In order to provide security, wireless communication should be authenticated and encrypted. Key management is the main problem in wireless sensor networks when concentrated on security. Any key management scheme proposed should have authenticity, integrity, confidentiality, flexibility and scalability. The key management scheme should be scalable to increase in sensor nodes substantially and also its dynamic nature. Asymmetric key management strategies are not suitable for wireless sensor networks as it operate on limited battery life. In the proposed system, key management is provided for privacy and simultaneously validated for security measures. System performance improves in the improved key management scheme by positioning the new node and forming the head for multi-cluster to replace the failed relay nodes. The private key, the multi-cluster key, the primary key, and the structure key are used to encrypt every message passed within the improved key management scheme. The improved key management scheme acquires results on 4–5 % improved security level with lesser execution time and communication energy consumption. A variety of numerical parameters are computed using ns2 simulator on existing key management schemes. The improved key management scheme is highly realistic because it is intended to incorporate routing layer and security protocol without sacrificing energy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Calinescu, G., Tongngam, S.: Relay Nodes in Wireless Sensor Networks. Wirel. Algorithms Syst. Appl. Lect. Notes Comput. Sci. 5258, 286–297 (2008). doi:10.1007/978-3-540-88582-5_28

    Article  Google Scholar 

  2. Doss, R., Schott, W.: Cooperative relaying in wireless sensor networks. In: Misra, S.C., Woungang, I., Misra, S. (eds.) Guide to Wireless Sensor Networks Computer Communications and Networks, pp. 159–181. Springer, London (2009). doi:10.1007/978-1-84882-218-4_6

  3. Liu, B.H., Lin, Y.X., Wang, W.S., Lien, C.Y.: A modified method for constructing minimum size homogeneous wireless sensor networks with relay nodes to fully cover critical square grids. Genet. Evol. Comput. Adv. Intell. Syst. Comput. 238, 213–220 (2014). doi:10.1007/978-3-319-01796-9_22

    Article  Google Scholar 

  4. Komninos, N., Vergados, D.D., Douligeris, C.: Security for ad hoc networks. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 421–432. Springer, New York (2010). doi:10.1007/978-3-642-04117-4_22

  5. Lou, W., Fang, Y.: A survey of wireless security in mobile ad hoc networks: challenges and available solutions. Ad Hoc Wireless Networking, Network theory and applications, vol. 14, pp. 319–364 (2004)

    Google Scholar 

  6. Pervaiz, M.O., Cardei, M., Wu, J.: Routing security in ad hoc wireless. In: Huang, S.C.H., MacCallum, D., Du, D.Z. (eds.) Networks Network Security, pp. 117–142 (2010). doi:10.1007/978-0-387-73821-5_6

  7. Kumar, D.S., Nagarajan, N.: Improved network topology acquisition processes in IEEE 802.16j nontransparent mode relay networks. J. Discrete Math. Sci. Crypt. 15(1), 57–71 (2013)

    Google Scholar 

  8. Dargie, W., Poellabauer, C.: Fundamentals of Wireless Sensor Networks: Theory and Practice. Wiley, UK (2010)

    Book  Google Scholar 

  9. Ismail, M., Sanavullah, M.Y.: Security topology in wireless sensor networks with routing optimization. In: Fourth International Conference on Wireless Communication and Sensor Networks (WCSN 2008), Allahabad, India, 27–29 Dec 2008, pp. 7–15. doi:10.1109/WCSN.2008.4772673

  10. Jing, G., Jia, L., Xie, L., Hu, Q., Liu, S.: Fluctuation control for many-to-one routing in wireless sensor networks. J. China Univ. Posts Telecommun. 19(6), 35–44 (2012)

    Article  Google Scholar 

  11. Üster, H., Lin, H.: Integrated topology control and routing in wireless sensor networks for prolonged network lifetime. Ad Hoc Netw. 9(5), 835–851 (2011)

    Article  Google Scholar 

  12. Xu, D., Gao, J.: Comparison study to hierarchical routing protocols in wireless sensor networks. Procedia Environ. Sci. 10, Part A, 595–600 (2011)

    Google Scholar 

  13. Liang, Y., Liu, R.: Routing topology inference for wireless sensor networks. ACM SIGCOMM Comput. Commun. Rev. 43(2), 21–28 (2013)

    Article  Google Scholar 

  14. Kwon, S.C., Hendessi, F., Fekri, F., Stuber, G.L.: A novel collaboration scheme for multi-channel/interface network coding. IEEE Trans. Wirel. Commun. 10(1), 188–198 (2011)

    Article  Google Scholar 

  15. Ke, W.C., Liu, B.H., Tsai, M.J.: Efficient algorithm for constructing minimum size wireless sensor networks to fully cover critical square grids. IEEE Trans. Wirel. Commun. 10(4), 1154–1164 (2011)

    Google Scholar 

  16. Kasbekar, G.S., Bejerano, Y., Sarkar, S.: Lifetime and coverage guarantees through distributed coordinate-free sensor activation. IEEE/ACM Trans. Networking 19(2), 470–483 (2011)

    Article  Google Scholar 

  17. Wang, X., Ma, J., Wang, S., Bi, D.: Distributed energy optimization for target tracking in wireless sensor networks. IEEE Trans. Mob. Comput. 9(1), 73–86 (2010)

    Article  Google Scholar 

  18. De Rango, F., Guerriero, F., Fazio, P.: Link-stability and energy aware routing protocol in distributed wireless networks. IEEE Trans. Parallel Distrib. Syst. 23(4), 713–726 (2012)

    Article  Google Scholar 

  19. Tan, H.O., Korpeoglu, I., Stojmenovi, I.: Computing localized power efficient data aggregation trees for sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(3), 489–500 (2011)

    Article  Google Scholar 

  20. Yuea, J., Zhang, W., Xiao, W., Tang, D., Tang, J.: Energy efficient and balanced cluster-based data aggregation algorithm for wireless sensor networks. Procedia Eng. 29(2012): 2009–2015 (2012). http://dx.doi.org/10.1016/j.proeng.2012.01.253

  21. Lin, C., Wu, G., Xia, F., Li, M., Yao, L., Pei, Z.: Energy efficient ant colony algorithms for data aggregation in wireless sensor networks. J. Comput. Syst. Sci. (2012)

    Google Scholar 

  22. Chao, C.M., Hsiao, T.Y.: Design of structure-free and energy-balanced data aggregation in wireless sensor networks. J. Netw. Comput. Appl. 37, 229–239 (2014). http://dx.doi.org/10.1016/j.jnca.2013.02.013

  23. Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. 53(12), 2022–2037 (2009)

    Article  MATH  Google Scholar 

  24. Hua, C., Yum, T.P.: Optimal routing and data aggregation for maximizing lifetime of wireless sensor network. IEEE/ACM Trans. Networking 16(4), 892–903 (2008)

    Article  Google Scholar 

  25. Sicari, S., Grieco, L.A., Boggia, G., Coen-Porisini, A.: DyDAP: a dynamic data aggregation scheme for privacy aware wireless sensor networks. J. Syst. Softw. 85(1), 152–166 (2012)

    Article  Google Scholar 

  26. Djenouri, D., Balasingham, I.: Traffic-differentiation-based modular QoS localized routing for wireless sensor networks. IEEE Trans. Mob. Comput. 10(6), 797–809 (2011)

    Article  Google Scholar 

  27. Mesmoudi, S., Feham, M.: BSK-WBSN: biometric symmetric keys to secure wireless body sensors networks. Int. J. Netw. Secur. Appl. 3(5), 155–166 (2011). doi:10.5121/ijnsa.2011.3512155

  28. Hariharan, S., Shroff, N.S., Bagchi, S.: Secure neighbor discovery through overhearing in static multihop wireless networks. Comput. Netw. 55(6), 1229–1241 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmad Taher Azar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Satish kumar, D., Nagarajan, N., Taher Azar, A. (2014). An Improved Key Management Scheme with High Security in Wireless Sensor Networks. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43616-5_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43615-8

  • Online ISBN: 978-3-662-43616-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics