Dynamic group key management scheme for clustered wireless sensor networks

被引:0
|
作者
Saraswathi, R. Vijaya [1 ]
Padma Sree, L. [2 ]
Anuradha, K. [3 ]
机构
[1] Computer Science and Engineering, Vallurupalli Nageswara Rao Vignana Jyothi Institute of Engineering and Technology (VNRVJIET), Hyderabad,Telangana, India
[2] Electronics and Communications Engineering, Vallurupalli Nageswara Rao Vignana Jyothi Institute of Engineering and Technology (VNRVJIET), Hyderabad,Telangana, India
[3] Computer Science and Engineering, Gokaraju Rangaraju Institute of Engineering and Technology (GRIET), Hyderabad,Telangana, India
关键词
Sensor nodes;
D O I
10.1504/IJGUC.2020.110900
中图分类号
学科分类号
摘要
A Group Key Management is a technique to establish shared group key, between the cluster head and sensor nodes for multiple sessions in a clustered network environment. The common use of this established group key (also termed as conference key) is to permit users to encrypt and decrypt a particular broadcast message that is meant for the total user group. In this work, we propose a cluster based dynamic group key management protocol that is based on public key cryptography. Cluster head initiates establishment of group key to the sensor nodes efficiently and achieves secure communication. Later, the computation of the common group key is performed by each sensor node. Group members have functionality to join and leave from particular communication along with this, other nodes, equal to threshold compute new conference key without involvement of cluster head. The proposed protocol is investigated in terms of security and complexity analysis using network simulator (NS-2). Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:801 / 814
相关论文
共 50 条
  • [1] Dynamic group key management scheme for clustered wireless sensor networks
    Saraswathi, R. Vijaya
    Sree, L. Padma
    Anuradha, K.
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (06) : 801 - 814
  • [2] KCT-based group key management scheme in clustered Wireless Sensor Networks
    Chen, Huifang
    Mineno, Hiroshi
    Obashi, Yoshitsugu
    Kokogawa, Tomohiro
    Mizuno, Tadanori
    [J]. EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS, 2007, 4523 : 627 - +
  • [3] An Authenticated Dynamic Key Management Scheme for Clustered Sensor Networks
    Zhou Yajian
    Pan Anwei
    Li Jiguo
    [J]. CHINA COMMUNICATIONS, 2010, 7 (04) : 7 - 17
  • [4] A group-based dynamic key management scheme in wireless sensor networks
    Li, Guorui
    He, Jingsha
    Fu, Yingfang
    [J]. 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 127 - +
  • [5] Dynamic Key Management Scheme in Wireless Sensor Networks
    Chen, Shuai
    Liao, Xiaowei
    Shu, Renyi
    Shen, Xiaobo
    Xu, Xiaojun
    Zheng, Xiaodong
    [J]. HIGH PERFORMANCE NETWORKING, COMPUTING, AND COMMUNICATION SYSTEMS, 2011, 163 : 381 - +
  • [6] A dynamic key management scheme for dynamic wireless sensor networks
    Erfani, Seyed Hossein
    Javadi, Hamid H. S.
    Rahmani, Amir Masoud
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1040 - 1049
  • [7] A key management scheme based on random key distribution for clustered wireless sensor networks
    Kausar, Firdous
    Masood, Ashraf
    [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1395 - +
  • [8] KMSGC: A key management scheme for clustered wireless sensor networks based on group-oriented cryptography
    Sun, Yugeng
    Zhang, Juwei
    Ji, Hao
    Yang, Ting
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1259 - 1262
  • [9] Filesearch on group key management scheme for wireless sensor networks
    Sun, Ye
    Wang, Gaocai
    Yao, Zhonghuan
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 478 - 483
  • [10] Efficient Group Key Management Scheme in Wireless Sensor Networks
    Li, Guorui
    Wang, Ying
    He, Jingsha
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 411 - 415