Location-aware combinatorial key management scheme for clustered sensor networks

被引:117
|
作者
Younis, Mohamed F.
Ghumman, Kajaldeep
Eltoweissy, Mohamed
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
[2] Virginia Tech, Bradley Dept Elect & Comp Engn, Falls Church, VA 22043 USA
关键词
wireless sensor networks; secure group communications; key management; location-aware protocols; exclusion basis systems; combinatorial optimization; energy efficient design; collusion attacks;
D O I
10.1109/TPDS.2006.106
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive settings such as battlefield surveillance, border control, and infrastructure protection. Data confidentiality and authenticity are critical in these settings. However, the wireless connectivity, the absence of physical protection, the close interaction between WSNs and their physical environment, and the unattended deployment of WSNs make them highly vulnerable to node capture as well as a wide range of network-level attacks. Moreover, the constrained energy, memory, and computational capabilities of the employed sensor nodes limit the adoption of security solutions designed for wire-line and wireless networks. In this paper, we focus on the management of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on Exclusion Basis Systems ( EBS); a combinatorial formulation of the group key management problem. Our scheme is termed SHELL because it is Scalable, Hierarchical, Efficient, Location-aware, and Light-weight. Unlike most existing key management schemes for WSNs, SHELL supports rekeying and, thus, enhances network security and survivability against node capture. SHELL distributes key management functionality among multiple nodes and minimizes the memory and energy consumption through trading off the number of keys and rekeying messages. In addition, SHELL employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes by factoring the geographic location of nodes in key assignment. Simulation results demonstrate that SHELL significantly boosts the network resilience to attacks while conservatively consuming nodes' resources.
引用
收藏
页码:865 / 882
页数:18
相关论文
共 50 条
  • [1] A Location-Aware Authentication and Key Management Scheme for Wireless Sensor Networks
    Abdallah, Walid
    Boudriga, Noureddine
    2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2016, : 488 - 495
  • [2] ECPKS: An improved location-aware key management scheme in static sensor networks
    Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur 721 302, India
    Int. J. Netw. Secur., 2008, 3 (358-369):
  • [3] An unconditionally secure location-aware key management scheme for static sensor networks
    Das, Ashok Kumar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2008, 11 (03): : 333 - 355
  • [4] A location-aware scheme for key establishment in wireless sensor networks
    Das, Ashok Kumar
    Das, Abhijit
    Mohapatra, Surjyakanta
    Vavilapalli, Srihari
    2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 567 - +
  • [5] A location-aware key predistribution scheme for distributed wireless sensor networks
    Canh, Ngo Trong
    Van Phuong, Tran
    Lee, Young-Koo
    Lee, Sungyoung
    Lee, Heejo
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 197 - +
  • [6] Location-aware and secret share based dynamic key management scheme for wireless sensor networks
    Ma, Chunguang
    Geng, Guining
    Wang, Huiqiang
    Yang, Guang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 770 - 773
  • [7] A group rekeying scheme for location-aware sensor networks
    Biswas, Subir
    Afzal, Syed Rehan
    Lee, Gunhee
    Kim, Dong-Kyoo
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 276 - 279
  • [8] Flexible deployment models for location-aware key management in wireless sensor networks
    Yu, B
    Cao, XM
    Han, P
    Mao, DL
    Gao, CS
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 343 - 354
  • [9] GENDEP: Location-Aware Key Management for General Deployment of Wireless Sensor Networks
    Lee, JongHyup
    Kwon, Taekyoung
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [10] LKE: A self-configuring scheme for location-aware key establishment in wireless sensor networks
    Liu, Fang
    Cheng, Xiuzhen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (01) : 224 - 232