首页 » 文章 » 文章详细信息
Security and Communication Networks Volume 2019 ,2019-07-14
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)
Research Article
Ashwag Albakri 1 , 2 Lein Harn 1 Sejun Song 1
Show affiliations
DOI:10.1155/2019/3950129
Received 2019-02-06, accepted for publication 2019-07-03, Published 2019-07-03
PDF
摘要

Securing data transferred over a WSN is required to protect data from being compromised by attackers. Sensors in the WSN must share keys that are utilized to protect data transmitted between sensor nodes. There are several approaches introduced in the literature for key establishment in WSNs. Designing a key distribution/establishment scheme in WSNs is a challenging task due to the limited resources of sensor nodes. Polynomial-based key distribution schemes have been proposed in WSNs to provide a lightweight solution for resource-constraint devices. More importantly, polynomial-based schemes guarantee that a pairwise key exists between two sensors in the WSNs. However, one problem associated with all polynomial-based approaches in WSNs is that they are vulnerable to sensor capture attacks. Specifically, the attacker can compromise the security of the entire network by capturing a fixed number of sensors. In this paper, we propose a novel polynomial-based scheme with a probabilistic security feature that effectively reduces the security risk of sensor-captured attacks and requires minimal memory and computation overhead. Furthermore, our design can be extended to provide hierarchical key management to support data aggregation in WSNs.

授权许可

Copyright © 2019 Ashwag Albakri et al. 2019
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

通讯作者

Ashwag Albakri.Department of Computer Science Electrical Engineering, University of Missouri–Kansas City, Kansas City, MO 64110, USA, missouri.edu;Department of Computer Science, Jazan University, 45142, Saudi Arabia, jazanu.edu.sa.aoaz89@mail.umkc.edu

推荐引用方式

Ashwag Albakri,Lein Harn,Sejun Song. Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN). Security and Communication Networks ,Vol.2019(2019)

您觉得这篇文章对您有帮助吗?
分享和收藏
0

是否收藏?

参考文献
[1] M. P. Durišić, Z. Tafa, G. Dimić, V. Milutinović. et al.A survey of military applications of wireless sensor networks. :196-199. DOI: 10.1016/j.jnca.2015.10.011.
[2] A.-N. Shen, S. Guo, H.-Y. Chien. An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks. :1-5. DOI: 10.1016/j.jnca.2015.10.011.
[3] W. Du, J. Deng, Y. S. Han, P. K. Varshney. et al.(2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security.8(2):228-258. DOI: 10.1016/j.jnca.2015.10.011.
[4] P. T. C., K. G. Boroojeni, M. Hadi Amini, N. Sunitha. et al.(2019). Key pre-distribution scheme with join leave support for SCADA systems. International Journal of Critical Infrastructure Protection.24:111-125. DOI: 10.1016/j.jnca.2015.10.011.
[5] T. Azzabi, H. Farhat, N. Sahli. A survey on wireless sensor networks security issues and military specificities. :66-72. DOI: 10.1016/j.jnca.2015.10.011.
[6] O. Cheikhrouhou. (2016). Secure group communication in wireless sensor networks: a survey. Journal of Network and Computer Applications.61:115-132. DOI: 10.1016/j.jnca.2015.10.011.
[7] On the capacity of hybrid wireless networks - IEEE Conference Publication. . DOI: 10.1016/j.jnca.2015.10.011.
[8] L. Harn, C.-F. Hsu, Z. Xia, J. Zhou. et al.(2017). How to share secret efficiently over networks. Security and Communication Networks.2017-6. DOI: 10.1016/j.jnca.2015.10.011.
[9] Y. Wang, B. Ramamurthy, X. Zou. KeyRev: an efficient key revocation scheme for wireless sensor networks. :1260-1265. DOI: 10.1016/j.jnca.2015.10.011.
[10] I. Sinclair. (2001). Sensors and Transducers. DOI: 10.1016/j.jnca.2015.10.011.
[11] N. K. Kumar, M. J. Nene. Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks. :1-6. DOI: 10.1016/j.jnca.2015.10.011.
[12] P. Gupta, P. R. Kumar. (2000). The capacity of wireless networks. IEEE Transactions on Information Theory.46(2):388-404. DOI: 10.1016/j.jnca.2015.10.011.
[13] D. E. Knuth. (1997). The Art of Computer Programming.2. DOI: 10.1016/j.jnca.2015.10.011.
[14] M. Ge, K. R. Choo, H. Wu, Y. Yu. et al.(2016). Survey on key revocation mechanisms in wireless sensor networks. Journal of Network and Computer Applications.63:24-38. DOI: 10.1016/j.jnca.2015.10.011.
[15] D. Mall, K. Konaté, A.-S. K. Pathan. On the key revocation schemes in wireless sensor networks. :290-297. DOI: 10.1016/j.jnca.2015.10.011.
[16] Y. Cheng, D. P. Agrawal. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks.5(1):35-48. DOI: 10.1016/j.jnca.2015.10.011.
[17] X. Zhang, J. Wang. An efficient key management scheme in hierarchical wireless sensor networks. :1-7. DOI: 10.1016/j.jnca.2015.10.011.
[18] A. Kumar, N. Bansal, A. R. Pais. (2019). New key pre-distribution scheme based on combinatorial design for wireless sensor networks. IET Communications.13(7):892-897. DOI: 10.1016/j.jnca.2015.10.011.
[19] A. G. Dinker, V. Sharma. (2018). Trivariate polynomial based key management scheme (TPB-KMS) in hierarchical wireless sensor networks. Advances in Intelligent Systems and Computing.696:283-290. DOI: 10.1016/j.jnca.2015.10.011.
[20] N. Saqib, U. Iqbal. Security in wireless sensor networks using ECC. :270-274. DOI: 10.1016/j.jnca.2015.10.011.
[21] M. Alshammari, K. Elleithy. Secure and Efficient Key Management Protocol (SEKMP) for wireless sensor networks. :253-254. DOI: 10.1016/j.jnca.2015.10.011.
[22] L. Eschenauer, V. D. Gligor. A key-management scheme for distributed sensor networks. :41-47. DOI: 10.1016/j.jnca.2015.10.011.
[23] K. Hamsha, G. S. Nagaraja. (2019). Threshold cryptography based light weight key management technique for hierarchical WSNs. Ubiquitous Communications and Network Computing.276:188-197. DOI: 10.1016/j.jnca.2015.10.011.
[24] A. Albakri, M. Maddumala, L. Harn. Hierarchical polynomial-based key management scheme in fog computing. :1593-1597. DOI: 10.1016/j.jnca.2015.10.011.
[25] S. Zhu, S. Setia, S. Jajodia. (2006). LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks.2(4):500-528. DOI: 10.1016/j.jnca.2015.10.011.
[26] P. N. Bahrami, H. H. Javadi, T. Dargahi, A. Dehghantanha. et al.(2018). A hierarchical key pre-distribution scheme for fog networks. Concurrency and Computation: Practice and Experience:e4776. DOI: 10.1016/j.jnca.2015.10.011.
[27] Z. Mahmood, H. Ning, A. Ghafoor. (2017). A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors.17(4):670. DOI: 10.1016/j.jnca.2015.10.011.
[28] I. F. Akyildiz, M. Can Vuran. (2010). Wireless Sensor Networks. DOI: 10.1016/j.jnca.2015.10.011.
[29] B. Maala, H. Bettahar, A. Bouabdallah. TLA: a tow level architecture for key management in wireless sensor networks. :639-644. DOI: 10.1016/j.jnca.2015.10.011.
[30] L. Harn, C. Hsu, O. Ruan, M. Zhang. et al.(2016). Novel design of secure end-to-end routing protocol in wireless sensor networks. IEEE Sensors Journal.16(6):1779-1785. DOI: 10.1016/j.jnca.2015.10.011.
[31] D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks. :52-61. DOI: 10.1016/j.jnca.2015.10.011.
[32] S. Zhao, K. Tepe, I. Seskar, D. Raychaudhuri. et al.Routing protocols for self-organizing hierarchical ad-hoc wireless networks. :1-4. DOI: 10.1016/j.jnca.2015.10.011.
[33] S. Hu. A hierarchical key management scheme for wireless sensor networks based on identity-based encryption. :384-389. DOI: 10.1016/j.jnca.2015.10.011.
文献评价指标
浏览 17次
下载全文 1次
评分次数 0次
用户评分 0.0分
分享 0次