Abstract
Security becomes extremely important, when wireless sensor networks are deployed in a hostile environment. In order to provide security, wireless communication should be authenticated and encrypted. Key management is the main problem in wireless sensor networks when concentrated on security. Any key management scheme proposed should have authenticity, integrity, confidentiality, flexibility and scalability. The key management scheme should be scalable to increase in sensor nodes substantially and also its dynamic nature. Asymmetric key management strategies are not suitable for wireless sensor networks as it operate on limited battery life. In the proposed system, key management is provided for privacy and simultaneously validated for security measures. System performance improves in the improved key management scheme by positioning the new node and forming the head for multi-cluster to replace the failed relay nodes. The private key, the multi-cluster key, the primary key, and the structure key are used to encrypt every message passed within the improved key management scheme. The improved key management scheme acquires results on 4–5 % improved security level with lesser execution time and communication energy consumption. A variety of numerical parameters are computed using ns2 simulator on existing key management schemes. The improved key management scheme is highly realistic because it is intended to incorporate routing layer and security protocol without sacrificing energy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Calinescu, G., Tongngam, S.: Relay Nodes in Wireless Sensor Networks. Wirel. Algorithms Syst. Appl. Lect. Notes Comput. Sci. 5258, 286–297 (2008). doi:10.1007/978-3-540-88582-5_28
Doss, R., Schott, W.: Cooperative relaying in wireless sensor networks. In: Misra, S.C., Woungang, I., Misra, S. (eds.) Guide to Wireless Sensor Networks Computer Communications and Networks, pp. 159–181. Springer, London (2009). doi:10.1007/978-1-84882-218-4_6
Liu, B.H., Lin, Y.X., Wang, W.S., Lien, C.Y.: A modified method for constructing minimum size homogeneous wireless sensor networks with relay nodes to fully cover critical square grids. Genet. Evol. Comput. Adv. Intell. Syst. Comput. 238, 213–220 (2014). doi:10.1007/978-3-319-01796-9_22
Komninos, N., Vergados, D.D., Douligeris, C.: Security for ad hoc networks. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 421–432. Springer, New York (2010). doi:10.1007/978-3-642-04117-4_22
Lou, W., Fang, Y.: A survey of wireless security in mobile ad hoc networks: challenges and available solutions. Ad Hoc Wireless Networking, Network theory and applications, vol. 14, pp. 319–364 (2004)
Pervaiz, M.O., Cardei, M., Wu, J.: Routing security in ad hoc wireless. In: Huang, S.C.H., MacCallum, D., Du, D.Z. (eds.) Networks Network Security, pp. 117–142 (2010). doi:10.1007/978-0-387-73821-5_6
Kumar, D.S., Nagarajan, N.: Improved network topology acquisition processes in IEEE 802.16j nontransparent mode relay networks. J. Discrete Math. Sci. Crypt. 15(1), 57–71 (2013)
Dargie, W., Poellabauer, C.: Fundamentals of Wireless Sensor Networks: Theory and Practice. Wiley, UK (2010)
Ismail, M., Sanavullah, M.Y.: Security topology in wireless sensor networks with routing optimization. In: Fourth International Conference on Wireless Communication and Sensor Networks (WCSN 2008), Allahabad, India, 27–29 Dec 2008, pp. 7–15. doi:10.1109/WCSN.2008.4772673
Jing, G., Jia, L., Xie, L., Hu, Q., Liu, S.: Fluctuation control for many-to-one routing in wireless sensor networks. J. China Univ. Posts Telecommun. 19(6), 35–44 (2012)
Üster, H., Lin, H.: Integrated topology control and routing in wireless sensor networks for prolonged network lifetime. Ad Hoc Netw. 9(5), 835–851 (2011)
Xu, D., Gao, J.: Comparison study to hierarchical routing protocols in wireless sensor networks. Procedia Environ. Sci. 10, Part A, 595–600 (2011)
Liang, Y., Liu, R.: Routing topology inference for wireless sensor networks. ACM SIGCOMM Comput. Commun. Rev. 43(2), 21–28 (2013)
Kwon, S.C., Hendessi, F., Fekri, F., Stuber, G.L.: A novel collaboration scheme for multi-channel/interface network coding. IEEE Trans. Wirel. Commun. 10(1), 188–198 (2011)
Ke, W.C., Liu, B.H., Tsai, M.J.: Efficient algorithm for constructing minimum size wireless sensor networks to fully cover critical square grids. IEEE Trans. Wirel. Commun. 10(4), 1154–1164 (2011)
Kasbekar, G.S., Bejerano, Y., Sarkar, S.: Lifetime and coverage guarantees through distributed coordinate-free sensor activation. IEEE/ACM Trans. Networking 19(2), 470–483 (2011)
Wang, X., Ma, J., Wang, S., Bi, D.: Distributed energy optimization for target tracking in wireless sensor networks. IEEE Trans. Mob. Comput. 9(1), 73–86 (2010)
De Rango, F., Guerriero, F., Fazio, P.: Link-stability and energy aware routing protocol in distributed wireless networks. IEEE Trans. Parallel Distrib. Syst. 23(4), 713–726 (2012)
Tan, H.O., Korpeoglu, I., Stojmenovi, I.: Computing localized power efficient data aggregation trees for sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(3), 489–500 (2011)
Yuea, J., Zhang, W., Xiao, W., Tang, D., Tang, J.: Energy efficient and balanced cluster-based data aggregation algorithm for wireless sensor networks. Procedia Eng. 29(2012): 2009–2015 (2012). http://dx.doi.org/10.1016/j.proeng.2012.01.253
Lin, C., Wu, G., Xia, F., Li, M., Yao, L., Pei, Z.: Energy efficient ant colony algorithms for data aggregation in wireless sensor networks. J. Comput. Syst. Sci. (2012)
Chao, C.M., Hsiao, T.Y.: Design of structure-free and energy-balanced data aggregation in wireless sensor networks. J. Netw. Comput. Appl. 37, 229–239 (2014). http://dx.doi.org/10.1016/j.jnca.2013.02.013
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. 53(12), 2022–2037 (2009)
Hua, C., Yum, T.P.: Optimal routing and data aggregation for maximizing lifetime of wireless sensor network. IEEE/ACM Trans. Networking 16(4), 892–903 (2008)
Sicari, S., Grieco, L.A., Boggia, G., Coen-Porisini, A.: DyDAP: a dynamic data aggregation scheme for privacy aware wireless sensor networks. J. Syst. Softw. 85(1), 152–166 (2012)
Djenouri, D., Balasingham, I.: Traffic-differentiation-based modular QoS localized routing for wireless sensor networks. IEEE Trans. Mob. Comput. 10(6), 797–809 (2011)
Mesmoudi, S., Feham, M.: BSK-WBSN: biometric symmetric keys to secure wireless body sensors networks. Int. J. Netw. Secur. Appl. 3(5), 155–166 (2011). doi:10.5121/ijnsa.2011.3512155
Hariharan, S., Shroff, N.S., Bagchi, S.: Secure neighbor discovery through overhearing in static multihop wireless networks. Comput. Netw. 55(6), 1229–1241 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Satish kumar, D., Nagarajan, N., Taher Azar, A. (2014). An Improved Key Management Scheme with High Security in Wireless Sensor Networks. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-662-43616-5_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43615-8
Online ISBN: 978-3-662-43616-5
eBook Packages: EngineeringEngineering (R0)