An efficient secure key establishment method in cluster-based sensor network

被引:5
|
作者
Singh, Akansha [1 ]
Jain, Khushboo [2 ]
机构
[1] Noida Inst Engn & Technol, Greater Noida, India
[2] DIT Univ, Dehra Dun, Uttarakhand, India
关键词
Cluster-based sensor networks; Communication cost; Key storage; Hash function; Secure key establishment method; Wireless sensor networks; AUTHENTICATION SCHEME; AGREEMENT;
D O I
10.1007/s11235-021-00844-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The main issue for the security of wireless sensor networks (WSNs) is how to allow sensor nodes (SNs) to establish and share cryptographic keys in an energy-efficient, storage-efficient, and authentic manner for their secure data transmission. Furthermost recent studies carried out in this direction is concerned with homogeneous networks in which all sensor has identical characteristics and fundamental administration mechanisms. However, Cluster-based sensor networks have demonstrated better achievements and performance than homogeneous networks because of the several benefits of clustering. This inspired us to propose a secure key-establishment method for cluster-based sensor networks based on symmetric-key cryptography. Since symmetric key cryptography has small energy consumption, they are a great choice to prefer for securing the networks. Even though symmetric key cryptography has high storage needs, this deficiency can be reduced by using suitable methods-evaluating the proposed work that the storage needs are reduced along with reduced energy consumption. The work offers a favorable level of security against various intruders and possible security threats and is additionally scalable than the state-of-the-art techniques.
引用
收藏
页码:3 / 16
页数:14
相关论文
共 50 条
  • [31] A Cluster-Based Consensus Algorithm in a Wireless Sensor Network
    Li, Yanwei
    Zhou, Zhenyu
    Sato, Takuro
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [32] Bandwidth Assignment in a Cluster-based Wireless Sensor Network
    Azizi, Tarek
    Beghdad, Rachid
    Oussalah, Mourad
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1442 - +
  • [33] Optimization of task allocation in a cluster-based sensor network
    Younis, M
    Akkaya, K
    Kunjithapatham, A
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 329 - 334
  • [34] A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks
    Xu, Ming
    Liu, Guangzhong
    Zhu, Daqi
    Wu, Huafeng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [35] On optimisation of cluster-based sensor network tracking system
    Wang, Yongcai
    Zhao, Qianchuan
    Zheng, Dazhong
    Guan, Xiaohong
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 14 (03) : 145 - 157
  • [36] Pruning method for a cluster-based neural network
    Ranney, K
    Khatri, H
    Nguyen, L
    Sichina, J
    ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY VII, 2000, 4053 : 274 - 279
  • [37] A Secure Scheme for Cluster-based Wireless Sensor Networks Based on Symmetric Polynomials
    Zhang, Yuquan
    Wei, Lei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 322 - 325
  • [38] Dual Trust Secure Protocol for Cluster-based Wireless Sensor Networks
    Yang, Li
    Moh, Melody
    2011 CONFERENCE RECORD OF THE FORTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS (ASILOMAR), 2011, : 1645 - 1649
  • [39] SAPC: A secure aggregation protocol for cluster-based wireless sensor networks
    Bekara, Chakib
    Laurent-LIaknavicius, Maryline
    Bekara, Kheira
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 784 - 798
  • [40] A Secure Network Coding-enabled approach for a confidential cluster-based Routing in wireless sensor networks
    Rhim, Hana
    Abassi, Ryma
    Tamine, Karim
    Sauveron, Damien
    Guemara, Sihem
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 2151 - 2157