Probabilistic Key Chain Based Key Distribution Schemes for WSN


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Wireless Sensor Network has numerous sensor nodes, each with restricted resources and capabilities. Because of the constraints of every node, symmetric key cryptography will be a suitable technique to secure the information exchanged between any two nodes. The strength of any security technique is based on the underlying key management technique. Key distribution is one of the main steps to be considered in the key management technique. So far, many key distribution schemes have been developed. In this paper, the probabilistic key chain based schemes for wireless sensor networks developed so far and their comparisons are presented.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Distributed Wireless Sensor Network; Hierarchical Wireless Sensor Network; Security; Key Pre-Distribution; Random Scheme; Hash-Based Scheme; Knowledge-Based Hash and Random Scheme

Full Text:

PDF


References


P. J. Hawrylak, L. Mats, J. T. Cain, A. K. Jones, S., Ultra-Low Power Computing System for Wireless Devices, (2006) International Review on Computers and Software (IRECOS), 1 (1), pp. 1-10.

M. Sharifi, A. N. Alamuti, A Hybrid Physical Architecture for Wireless Sensor and Actor Networks, (2007) International Review on Computers and Software (IRECOS), 2 (5), pp. 555-560.

Nesa Mouzehkesh, Nor K. Noordin, Mohd Fadlee A. Rasid, Proactive Traffic Adaptive Tuning of Contention Window for Wireless Sensor Network Medium Access Control Protocol, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 6-13.

Manoj R, N.Dhinakaran, “A Survey of Key Predistribution Schemes for Key Management in Wireless Sensor Networks”, Proc. 12th Intel conf. on Networking, VLSI and signal processing, 2010, Pages: 135-140.

S. Chattopadhyay, Ashok Kumar. T,” Survey on Key Pre-distribution Scheme in Homogeneous Wireless Sensor Networks”, Proc. 2nd Intl Conf on Advanced Computing and Communication Techniologies for high performance Applications, 2010, Pages: 267 - 272.

Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu and Michael Galloway, “A survey of key management schemes in wireless sensor networks”, Computer Communications 30 (2007), pp. 2314–2341, Elsevier, Science Direct.

Junqi Zhang, vijayvaradharajan, “Wireless sensor network key management survey and taxonomy”, Journal of Network and Computer Applications 33 (2010) 63–75.

Syed Muhammad Khaliq-ur-Rahman Raazi, Sungyoung Lee, "A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks", Journal of Computing Science and Engineering, The Korean Institute of Information Scientists and Engineers, 2010.

J. C. Lee, K. H. Wong, J. Cao, H. C. B. Chan, and V. C. M. Leung, “Key management issues in wireless sensor networks: Current proposals and future developments,” IEEE Wireless Commun., vol. 14, no. 5, pp. 76–84, Oct. 2007.

Sun D-M, He B. Review of key management mechanisms in wireless sensor networks. Acta Automatica Sinica 2006;32(6):900–6.

S. A. Camtepe and B. Yener, “Key Distribution Mechanisms for Wireless Sensor Networks: A Survey,” Computer Science Department at RPI, Tech. Rep. TR-05-07, 2005.

L. Eschenauer and V. D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. 9th ACM Conf. Comp. And Commun. Security, Nov. 2002, pp. 41–47.

H. Chan, A. Perrig, and D. Song, “Random Key Pre-distribution Schemes for Sensor Networks,” IEEE Symp.Security and Privacy, May 2003. Pp. 197–213.

Chent,Bidi Yingt, Bo Chent, Hiroshi Minenol And Tadanori Mizunol, “A Low Energy Key Management Scheme In Wireless Sensor Networks”, 2006 Ieee.

Abedelaziz Mohaisen, daehun Nyang and Tamer abuhmed, “Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks”, Ksii Transactions On Internet And Information Systems Vol. 2, No. 5, October 2008.

R. D. Pietro, L. V. Mancini, and A. Mei, “Random Key-Assignment for Secure Wireless Sensor Networks,” Proc. 1st ACM Wksp. Security of Ad Hoc and Sensor Networks, ACM Press, 2003, pp. 62–71.

David W. Carman, “New directions in Sensor Network Key Management”, International Journal of Distributed Sensor Networks, 1:3-15, 2005.

M. Mehta, D. Huang, and L. Harn, “RINK-RKP: A scheme for key predistribution and shared-Key discovery in sensor networks,” in The 24th IEEE International Performance Computing and Communications Conference, pp. 193-197, 2005.

K. Ren, K. Zeng, and W. Lou, “A New Approach for Random Key Pre-Distribution in Large Scale Wireless Sensor Networks,” Wiley J. Wireless Comm. And Mobile Computing, vol. 6, no. 3, pp. 307-318, 2006.

Zeen Kim , Jangseong Kim, Kwangjo Kim, “Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity”, Symposium on Cryptography and Information Security, Japan, Jan. 23-26, 2007 The Institute of Electronics, Information and Communication Engineers.

Jianmin Zhang; Jian Li; Xiande Liu; , "A Strong Key Pre-distribution Scheme for Wireless Sensor Networks," Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, vol.2, pp.231-234, 25-26 April 2009.

W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” IEEE Trans. Dependable and Secure Computing, vol. 3, no. 2, pp. 62-77, Jan.-Mar. 2006.

Rajgopal Kannan, Lydia Ray, Arjan Durresi and S. S. Iyengar, “Security-Performance Tradeoffs of Inheritance based Key Predistribution for Wireless Sensor Networks”, arxiv.cs, June 2004.

Jaemin Park, Zeen Kim, and Kwangjo Kim, “State-Based Key Management Scheme for Wireless Sensor Networks” IEEE Intl Conf on Mobile Adhoc and Sensor Systems Conference, 2005.

Takashi Ito, Hidenori Ohta, Nori Matsuda, andtakeshi Yoneda, “A Key Pre-Distribution Scheme for Secure Sensor Networks Using Probability Density Function of Node Deployment”, SASN05 November 7, 2005.

Nguyen, H.T.T.; Guizani, M.; Minho Jo; Eui-Nam Huh, “An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network”, Vehicular Technology, IEEE Transactions on, Volume 58, Issue 5, Jun 2009 Page(s):2482 – 2497.

Albert Levi, Sinan Emre Taşçı, Young Jae Lee, Yong Jae Lee and Ersoy Bayramoğlu, et al., “Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools”,Journal of Intelligent Manufacturing, 2010, Vol 21, Num 5, Pages 635-645.

Korporn Panyim and Prashant Krishnamurthy, “A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks”, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1, Volume 10, Pages 715-731, 2010.

Mhatre, V.; Rosenberg, C. 2004. Homogeneous vs heterogeneous clustered sensor networks: a comparative study. Communications, IEEE International Conf on, Vol.6, (2004), PP: 3646 – 3651.

Chengzhi Long, Jianping Luo, Mantian Xiang, Guicai Yu, Optimal Cluster Head Cooperative Deployment in Heterogeneous Wireless Sensor Networks, (2011) International Review on Computers and Software (IRECOS), 6 (7), pp. 1228-1231.

W. Heinzelman, A. Chandrakasan and H. Balakrishnan. 2002. An Application Specific Protocol Architecture for Wireless Micro sensor Networks. IEEE Transactions on Wireless Communications, Vol. 1, No. 4, (October 2002).

Haibo Pu, Lijia Xu, An Improved Hierarchical Data Aggregation Mechanism in Wireless Sensor Network Based on LEACH, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 2220-2225.

Yuquan Zhang, Min You, A Secure Scheme for Three-Dimension Heterogeneous Wireless Sensor Networks, (2013) International Review on Computers and Software (IRECOS), 8 (1), pp. 416-421.

Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, and Thomas La Porta, “Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks”, IEEE Transactions On Mobile Computing, Vol. 6, No. 6, June 2007, pp. 633 -677.

Boushra Maala and Yacine Challal and Abdelmadjid Bouabdallah, “HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks”, 2008, in IFIP, Volume 264; Wireless Sensor and Actor Networks II; Boston: Springer, pp. 125–136.

F. Anjum, Location dependent key management using random key pre distribution in sensor networks, in: Proceedings of wise’06.

Firdous Kausar • Sajid Hussain • Laurence T. Yang • Ashraf Masood, “Scalable and efficient key management for heterogeneous sensor networks”, J Supercomput, Springer, LLC 2008.

Banihashemian, S. Bafghi, A.G., "A new key management scheme in heterogeneous wireless sensor networks," Advanced Communication Technology,12th Intl Conf on, vol.1, no., pp.141-146, 2010.

S.-P. Chan, R. Poovendran, and M. T. Sun, “A Key Management Scheme in Distributed Sensor Networks Using Attack Probabilities”, Proce of IEEE GLOBECOM’2005, November 2005.

Mittal, N.; Novales, R.; , "Cluster-Based Key Predistribution Using Deployment Knowledge," Dependable and Secure Computing, IEEE Transactions on , vol.7, no.3, pp.329-335, 2010.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize