Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

被引:26
|
作者
Choi, Jaewoo [1 ]
Bang, Jihyun [1 ]
Kim, LeeHyung [2 ]
Ahn, Mirim [2 ]
Kwon, Taekyoung [1 ]
机构
[1] Yonsei Univ, Grad Sch Informat, Seoul 120749, South Korea
[2] Agcy Def Dev, Seoul 350600, South Korea
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Insider threats; key revision process; location-based key management; packet drop attack; wireless sensor network (WSN); PREDISTRIBUTION; AGGREGATION;
D O I
10.1109/JSYST.2015.2422736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs.
引用
收藏
页码:494 / 502
页数:9
相关论文
共 50 条
  • [31] A Novel Location-Based Routing Algorithm for Energy balance in Wireless Sensor Networks
    Wu, Renyong
    Chen, Mingquan
    Su, Yuanyuan
    Siddiqui, Hamad Javaid
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL I, 2009, : 568 - 572
  • [32] LEDO: Location-based Distribution Energy Optimization protocol in wireless sensor networks
    Jie, Xu
    Zhou, Haiying
    Luo, Danyan
    Zuo, Decheng
    Hou, Kun-Mean
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [33] A Comparative Analysis of Flat, Hierarchical and Location-Based Routing in Wireless Sensor Networks
    Hazique Aetesam
    Itu Snigdh
    Wireless Personal Communications, 2017, 97 : 5201 - 5211
  • [34] Location-based address configuration for 6LoWPAN wireless sensor networks
    Wang, Xiaonan
    Le, Deguang
    Cheng, Hongbin
    Yao, Yufeng
    WIRELESS NETWORKS, 2015, 21 (06) : 2019 - 2033
  • [35] Location-based mobility support for 6LoWPAN wireless sensor networks
    Wang, Xiaonan
    Le, Deguang
    Yao, Yufeng
    Xie, Conghua
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 49 : 68 - 77
  • [36] Location-based Inner-Cluster Data Aggregation for Wireless Sensor Networks
    Guo, Jianghong
    Zhang, Haifeng
    Chen, Weijun
    CONFERENCE ON MODELING, IDENTIFICATION AND CONTROL, 2012, 3 : 523 - 527
  • [37] Securing sensor networks with location-based keys
    Zhang, WC
    Liu, W
    Lou, WJ
    Fang, YG
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1909 - 1914
  • [38] The Key Management Scheme of Wireless Sensor Networks Based on Key Database
    Wan Ting
    Zhuo Li
    Wei Yan
    Zhang Qing
    Liu Gang
    ISTM/2011: 9TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, 2011, : 710 - 713
  • [39] Queuing the Trust: Secure Backpressure Algorithm against Insider Threats in Wireless Networks
    Lu, Zhuo
    Sagduyu, Yalin E.
    Li, Jason H.
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [40] Key management in wireless sensor networks
    Lee, YH
    Phadke, V
    Deshmukh, A
    Lee, JW
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 190 - 204