Open Access Open Access  Restricted Access Subscription or Fee Access

Cluster Based Key Management & Authentication Technique for Wireless Sensor Networks

T. Lalitha, Dr.R. Umarani


In wireless sensor networks, the security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink is not securely transmitted to the compromised node, it will lead to denial of service attack. In this paper, we propose a cluster based key management technique for authentication in wireless sensor networks. Initially, clusters are formed in the network and the cluster heads are selected based on the energy cost, coverage and processing capacity. The sink assigns cluster key to every cluster and an EBS key set to every cluster head. The EBS key set contains the pairwise keys for intra-cluster and inter-cluster communication. The cluster head upon detecting a compromised node in its cluster sends a request to sink to perform re-keying operation. The re-keying process utilizes the hashing function for authentication and nodes are recovered in a secured manner.


Wireless sensor networks,CLUSTER BASED KEY MANAGEMENT TECHNIQUE,EBS Construction

Full Text:



Lina M. Pestana Leão de Brito and Laura M. Rodríguez Peralta, “An Analysis of Localization Problems and Solutions in Wireless Sensor Networks”, Polytechnical Studies Review, 2008, Vol VI, ISSN: 1645-9911.

Huang Lee and Hamid Aghajan, “Collaborative Self-Localization Techniques for Wireless Image Sensor Networks”, In Proc. of Asilomar Conf. on Signals, Systems and Computers, Oct. 2005.

D.Saravanan , D.Rajalakshmi and D.Maheswari “DYCRASEN: A Dynamic Cryptographic Asymmetric Key Management for Sensor Network using Hash Function”, International Journal of Computer Applications (0975 – 8887) Volume 18– No.8, March 2011

Lin SHEN and Xiangquan SHI, “ A Dynamic Cluster-based Key Management Protocol in Wireless Sensor Networks”, International journal of intelligent control and systems, Vol 13, No.2, pp 146-151, 2008 .

Mohammed A. Abuhelaleh and Khaled M. Elleithy, “Security in Wireless Sensor Networks: Key Management Module in SOOAWSN”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.