Open Access Open Access  Restricted Access Subscription or Fee Access

Towards a Key Pre-Distribution Scheme to Secure Emergency Sensor Networks


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v11i4.9120

Abstract


Wireless sensor networks (WSN) are known to be vulnerable to attacks and hard to protect due to their specific characteristics such as resource constraints and wireless infrastructure. Moreover, the transmitted information becomes more sensitive and vulnerable in critical scenarios such as emergency situations which require high confidentiality levels. For this purpose, the cryptography approach becomes compulsory since it enhances the security of data processing and transmitting against advanced and persistent threats including sniffing, traffic analysis and eavesdropping attacks by malicious nodes. The main process of cryptography is key management which generates, exchanges, uses, stores, replaces, protects, and destroys cryptographic keys. In this paper, we propose a key pre-distribution scheme to secure emergency sensor networks based on a hierarchical architecture. Its objective is to deal with large-scale wireless sensor networks while minimizing the overhead of processing, communication, and storage during the key management process. Our comparative analysis shows that the proposed scheme offers strong resiliency against a compromised cluster-head or single node and has more simplicity and robustness.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Hierarchical Wireless Sensor Networks; Cryptography; Key Pre-Distributed Management; Security; Emergency

Full Text:

PDF


References


N. Dimakis, A. Filippopoulitis and E. Gelenbe, Distributed building evacuation simulator for smart emergency management, (2010) The Computer Journal, 53 (9), pp. 1384-1400.
http://dx.doi.org/10.1093/comjnl/bxq012

A. Filippoupolitis, L. Hey, G. Loukas, E. Gelenbe and S. Timotheou, Emergency response simulation using wireless sensor networks, Proceedings of the 1st international conference on Ambient media and system ( Page: 1-8 February 11-14 2008 ISBN: 978-963-9799-16-5).
http://dx.doi.org/10.4108/icst.ambisys2008.2903

Jafarian, M. and Jaseemuddin, M., Routing of Emergency Data in a Wireless Sensor Network for Mines. Proceedings in the ICC 2008. IEEE Comm (Page: 2813–2818 May 19-23 2008).

http://dx.doi.org/10.1109/icc.2008.530

A. Ko, and H.Y.K. Lau, Robot Assisted Emergency Search and Rescue System With a Wireless Sensor Networks, (2009) International Journal of Advanced Science and Technology, 3, pp. 69-78.

C. Y. Chow, W. Xu, and T. He, Privacy Enhancing Technologies for Wireless Sensor Networks. In The Art of Wireless Sensor Networks (Springer Berlin Heidelberg, 2014, 609-641)
http://dx.doi.org/10.1007/978-3-642-40009-4_18

J. Sen, Security and privacy challenges in cognitive wireless sensor networks. Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, (Page: 194-232 2013).
http://dx.doi.org/10.4018/978-1-4666-4221-8.ch011

F. Xhafa, J. Li, D. S. Wong, and F. Palmieri, Advances in security and privacy in sensor networks, (2014) International Journal of Distributed Sensor Networks 2014.
http://dx.doi.org/10.1155/2014/956265

Kavitha, T., Sridharan, D., Probabilistic Key Chain Based Key Distribution Schemes for WSN, (2013) International Review on Computers and Software (IRECOS), 8 (5), pp. 1156-1169.

Geetha, R., Kannan, E., Secure Communication Against Framing Attack in Wireless Sensor Network, (2015) International Review on Computers and Software (IRECOS), 10 (4), pp. 393-398.
http://dx.doi.org/10.15866/irecos.v10i4.5520

M. M. M. Fouad, and A. E.Hassanien, Key Pre-distribution Techniques for WSN Security Services. In Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Springer Berlin Heidelberg, 2014 265-283).
http://dx.doi.org/10.1007/978-3-662-43616-5_11

O. K. Sahingoz, Large scale wireless sensor networks with multi-level dynamic key management scheme, (2013) Journal of Systems Architecture, 59(9), 801-807.
http://dx.doi.org/10.1016/j.sysarc.2013.05.022

W. Bechkit, Y. Challal, A. Bouabdallah, and V. Tarokh, A highly scalable key pre-distribution scheme for wireless sensor networks, (2013) Wireless Communications, IEEE Transactions on, 12(2), 948-959.
http://dx.doi.org/10.1109/twc.2012.010413.120732

D. Liu, P. Ning and W. Du, Group-based key pre-distribution in wireless sensor networks, Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005) (Page: 11-20 2005 ISBN: 1-59593-142-2.).
http://dx.doi.org/10.1145/1080793.1080798

DOI: 10.1145/1080793.1080798

S. Bala, G. Sharma, and A. K. Verma, Classification of symmetric key management schemes for wireless sensor networks, (2013) International Journal of Security and Its Applications, 7(2), pp. 117-138.

X. He, M.Niedermeier,andH. De Meer, Dynamic key management in wireless sensor networks: A survey, (2013) Journal of Network and Computer Applications, 36(2), pp. 611-622.
http://dx.doi.org/10.1016/j.jnca.2012.12.010

L. Eschenauer, and V.D. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communications Security. (Page: 41-47 2002 ISBN: 1-58113-612-9.).
http://dx.doi.org/10.1145/586110.586117

H. Chan, A. Perrig and D. Song, Random key pre-distribution schemes for sensor networks, Proceedings of IEEE Symposium on Security and Privacy, Berkeley, California, (Page: pp. 197–213 11-14 May 2003).

W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, Proc. of IEEE INFOCOM’04, (7-11 March 2004).
http://dx.doi.org/10.1109/infcom.2004.1354530

R. Blom, An optimal class of symmetric key generation systems, Proceedings of the Eurocrypt 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, (Springer), (Page 335–338 1985).

W. Du, J. Deng, Y.S. Han and P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, (Page: 42–51 2003 ISBN: 1-58113-738-9).
http://dx.doi.org/10.1145/948109.948118

S. Sukumar, Computational Analysis of Modified Blom's Scheme, (2013) arXiv preprint arXiv:1303.7457.

C. Blundo, AD. Santix, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly-secure key distribution for dynamic conferences, Proceedings of the 12th Annual International Cryptology Conference on Advances in Crypto-logy, Berlin, Germany (Spring). (Page: 471-486 1992).
http://dx.doi.org/10.1007/3-540-48071-4_33

D. Liu, and P.Ning, Establishing Pairwise Keys in Distributed Sensor Networks. In Proc. of the 10th ACM Conference on Computer and Communications Security (Page: 41-77 October 2003 ISBN: 1-58113-738-9).
http://dx.doi.org/10.1145/948109.948119

S. A. Camtepe, and B. Yener, Key Distribution Mechanisms for Wireless Sensor Networks: a Survey. Department of Computer Science, Rensselaer Polytechnic Institute, Technical Report TR-05-07 (2005) http://www.cs.rpi.edu/research/pdf/05-07.pdf.

A. Perrig, R. Szewczyk, V. Wen, D. Culler and JD. Tygar, SPINS: security protocols for sensor networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, (ACM Press), (Page: 189–199 2001).
http://dx.doi.org/10.1145/381677.381696

S. H. Seo, J. Won, S. Sultana, and E. Bertino, Effective key management in dynamic wireless sensor networks. (2015) Information Forensics and Security, IEEE Transactions on, 10(2), pp. 371-383.
http://dx.doi.org/10.1109/tifs.2014.2375555

Aileni, A. 2010. Cluster based Key Management in Wireless Sensor Networks. arXiv preprint arXiv:1010.4816.

J. S. Lee, and W. L. Cheng, Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication, (2012) Sensors Journal, IEEE,12(9), pp. 2891-2897.
http://dx.doi.org/10.1109/jsen.2012.2204737

X. Liu, A survey on clustering routing protocols in wireless sensor networks, (2012) Sensors, 12(8), pp. 11113-11153.
http://dx.doi.org/10.3390/s120811113

Kandasamy, R., Krishnan, S., Enhanced Energy Efficient Method for WSN to Prevent Far-Zone, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (4), pp. 137-142.
http://dx.doi.org/10.15866/irecap.v4i4.3034

Khedher, M., Liouane, H., Douik, A., XOR-Based Routing Protocol for Wireless Sensor Networks, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (2), pp. 70-77.
http://dx.doi.org/10.15866/irecap.v5i2.5103

Mubarak, T., Appa Rao, G., Sattar, S., Sajitha, M., Efficient Intrusion Detection Ensuring Connectivity in 2D and 3D WSN, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 219-229.

B. Mandicou, N. Ibrahima, G. Bamba and al., A deterministic key management scheme for securing cluster-based sensors networks, Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on. IEEE (Page: pp. 422-427 11-13 December 2010).
http://dx.doi.org/10.1109/euc.2010.70

J. Gaurav, M. C. KUŞÇU, K. Pallavi and M. Younis, A low-energy key management protocol for wireless sensor networks, Computers and Communication, 2003.(ISCC 2003). Proceedings. Eighth IEEE International Symposium on. IEEE (Page: 335-340 2003).
http://dx.doi.org/10.1109/iscc.2003.1214142

Y. Cheng, and D. P. Agrawal, An improved key distribution mechanism for large-scale hierarchical wireless sensor networks, (2007) Ad Hoc Networks, 5(1), pp. 35-48.
http://dx.doi.org/10.1016/j.adhoc.2006.05.011


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize