Skip to main content

CL-PKA: Key Management in Dynamic Wireless Sensor Network: A Novel Framework

  • Conference paper
  • First Online:
Book cover Emerging Research in Electronics, Computer Science and Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 545))

Abstract

Lately, wireless sensor networks (WSNs) have been sent for a wide arrangement of utilization, including military distinguishing and following, industrial status checking, action stream checking, where tangible devices oftentimes move between various regions. Securing information and correspondences require suitable encryption key conventions. In this investigation, propose a certificate less-powerful key administration (CL-PKA) protocol for secure correspondence in one of a kind WSNs portrayed by hub versatility. The CL-PKA bolsters productive key updates when a node leaves or joins a bunch and guarantees forward and in reverse key mystery. The convention likewise bolsters effective key revocation for traded off hubs and limits the effect of a node compromise on the security of other correspondence joins. A secure examination of our plan demonstrates that our convention is effective in safeguarding against different attacks. This inquire about actualize CL-PKA in Conic OS and reproduce it utilizing Cooja test system to evaluate now is the ideal time, vitality, correspondence, and memory execution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proceedings of 6th international workshop cryptograph hardware embedded system, pp 119–132

    Google Scholar 

  2. Seo S, Bertino E (2013) Elliptic curve cryptography based certificateless hybrid sign-cryption scheme without pairing. CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR 2013-10. https://www.cerias.purdue.edu/apps/reports_and_papers/.Seung-Hyun

  3. Al-Riyami SS, Paterson KG (2013) Certificateless public key cryptography. In: Proceedings of 9th International Conference on ASIACRYPT, vol 2894, pp 452–473

    Google Scholar 

  4. Seo SH, Won J, Bertino E (2014) POSTER: a pairing-free certificate-less hybrid sign-cryption scheme for advanced metering infrastructures. In: Proceedings of 4th ACM CODASPY, pp 143–146

    Google Scholar 

  5. Agrawal S, Roman R, Das ML, Mathuria A, Lopez J (2012) A novel key update protocol in mobile sensor networks. In: Proceedings of 8th International Conference on ICISS, vol 7671, pp 194–207

    Google Scholar 

  6. Khan SU, Pastrone C, Lavagno L, Spirito MA. An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks. In: Proceedings of 6th international conference on CRiSIS, pp 1–8, Sept 2011

    Google Scholar 

  7. Sanchez DS, Baldus H. A deterministic pairwise key pre-distribution scheme for mobile sensor networks. In: Proceedings of 1st International Conference on SecureComm, pp 277–288, Sept 2005

    Google Scholar 

  8. Du W, Deng J, Han YS, Varshney P, Katz J, Khalili A (2005) A pairwise key predistribution scheme for wireless sensor networks. ACM Trans Inf Syst Secur 8(2):228–258

    Article  Google Scholar 

  9. Alagheband MR, Aref MR (2012) Dynamic and secure key management model for hierarchical heterogeneous sensor networks. IET Inf Secur 6(4):271–280

    Article  Google Scholar 

  10. Zhang X, He J, Wei Q (2011) EDDK: energy-efficient distributed deterministic key management for wireless sensor networks. EURASIPJ Wirel Commun Netw 2011:1–11

    Google Scholar 

  11. Chan H, Perrig A, Song D (2003) Random key pre distribution schemes for sensor networks. In: Proceedings of IEEE symposium

    Google Scholar 

  12. Du W, Deng J, Han YS, Varshney PK (2006) A key pre distribution scheme for sensor networks using deployment knowledge. IEEE Trans Dependable Secure Comput 3(1):62–77

    Article  Google Scholar 

  13. Chuang I-H, Su W-T, Wu C-Y, Hsu J-P, Kuo Y-H. Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks. In: Proceedings of IEEE WCNC, pp 4145–4150, Mar 2007

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Gowtham .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gowtham, M., Pratish, D.T., Banga, M.K., Patil, M. (2019). CL-PKA: Key Management in Dynamic Wireless Sensor Network: A Novel Framework. In: Sridhar, V., Padma, M., Rao, K. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 545. Springer, Singapore. https://doi.org/10.1007/978-981-13-5802-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5802-9_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5801-2

  • Online ISBN: 978-981-13-5802-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics