Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Analysis of Individual Pair-wise Cluster Key Management Scheme for Wireless Sensor Network

Yogesh Chaba, Yudhvir Singh, Ritu Sharma

Abstract


Due to the wide range of applications, Wireless Sensor Network(WSN) have recently attracted a lot of interest in the research community.WSN consist of large number of low-power sensor nodes, with limited processing, communication and storage resources. Due to limited resources of WSNs, it is challenging to incorporate basic security functions, such as authentication, privacy, confidentiality, availability and integrity etc. In order to protect the sensitive data and the sensor reading, secret keys should be used to encrypt the exchanged messages between communicating nodes. Because of high energy consumption and increased code storage requirement is needed by asymmetric cryptography such as RSA or ECC. Key management is one of the oldest areas in WSN security solution. This paper is devoted to the research on security efficiency for wireless sensor networks. The proposed scheme of IPC(Inter Process Communication) key management is based on the generation and distribution of the individual key, pair-wise key and the cluster head broadcast key. IPC have simulated and shows the performance for energy consumption with increasing number of neighbors, and time taken in individual key establishment with the number of nodes in the network. The security analysis shows that the scheme within this paper meets the unique security needs of the sensor networks.

Keywords


Attacks, Key Management, Security, Sensor node, Wireless Sensor Network

Full Text:

PDF

References


I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: A Survey”, Computer Networks Journal, Elsevier Science, Vol. 38, No. 4 pp 393–422 (2002).

Kausar F., Hussain S., Yang L. T., Masood A., “Scalable and Efficient key management for heterogeneous sensor networks.”, Journal of Supercomputing, Vol 45, p.p. 44-65 (2008).

Gunnar Gaubat, Jens-Peter Kaps, Berk Sunar, “Public Key Cryptography in Sensor networks- Revisited”, Lecture Notes in Computer Science, Vol. 3313, pp. 2-18 (2005).

Naveen Sastry, David Wagner, “Security Consideration for IEEE802.15.4 Networks”, Proc. 3rd ACM Workshop on Wireless Security, pp. 32-42 (2004)

Jing Deng, Richard Han, Shivakant Mishra,”Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks”, Proc. 5th ACM International conference on Information processing in sensor networks, pp. 292-300 (2006).

Cauligi S. Raghavendra,”PEGASIS: Power- Efficient Gathering in Sensor Information System”, Proc. IEEE Aerospace Conference, Volume 3, pp. 1125 – 1130 (2002).

Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, “SPINS:Security Protocols for Sensor Networks”, ACM Journal of Wireless N/W, Kluwer Academic Publishers, Vol 8, pp. 521-534 (2002).

Sencun Zhu, Sanjeev Setia, Sushil Jajodia,”LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks”, ACM Transactions on Sensor Networks, Vol 2, Issue 4, pp. 500-528 (2006).

Chris karlof, Naveen Sastry, David Wanger, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proc. 2nd International Conference on Embedded networked sensor systems, pp. 162- 172 (2004).

J. C .Lee, Victor C., M. Leung, Kirk H. Wong, Jiannog Cao, and Henry C. B. Chan, “Key Management Issues In Wireless Sensor Networks: Current Proposals And Future Developments”, IEEE Transactions on Wireless Communications, Vol. 14, Issue 5, pp. 76-84 (2007).

J. Sen, “A Survey on Wireless sensor Network Security”, International Journal of Communication Networks and Information Security(IJCNIS), Vol.1, No. 2, p.p. 59-82 (2009).

Guohua Ou; Jie Huang; Juan Li , “A key-chain based key management scheme for heterogeneous sensor network” Proc. IEEE International Conference on Information Theory and Information Security, pp. 358 – 361 (2010).

Sharma, K.; Sharma, N.; Prasad, D.; Patel, R.B., “Flexible and efficient scheme for static wireless sensor networks” Proc. 2nd International Conference on Computer Engineering and Technology, Vol. 6, pp. 37 - 41 (2010)

Xuemei You, “Study on key distribution scheme for wireless sensor networks”, Proc. 2nd IEEE International Conference on Computer Engineering and Technology, Vol. 2, pp. 675 - 678 (2010).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.