Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

被引:26
|
作者
Choi, Jaewoo [1 ]
Bang, Jihyun [1 ]
Kim, LeeHyung [2 ]
Ahn, Mirim [2 ]
Kwon, Taekyoung [1 ]
机构
[1] Yonsei Univ, Grad Sch Informat, Seoul 120749, South Korea
[2] Agcy Def Dev, Seoul 350600, South Korea
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Insider threats; key revision process; location-based key management; packet drop attack; wireless sensor network (WSN); PREDISTRIBUTION; AGGREGATION;
D O I
10.1109/JSYST.2015.2422736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs.
引用
收藏
页码:494 / 502
页数:9
相关论文
共 50 条
  • [41] Key management in wireless sensor networks
    Lopriore, Lanfranco
    INFORMATION SECURITY JOURNAL, 2019, 28 (1-2): : 20 - 34
  • [42] Key Management in Wireless Sensor Networks
    Mansour, Ismail
    Chalhoub, Gerard
    Lafourcade, Pascal
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2015, 4 (03): : 251 - 273
  • [43] A Location-Aware Authentication and Key Management Scheme for Wireless Sensor Networks
    Abdallah, Walid
    Boudriga, Noureddine
    2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2016, : 488 - 495
  • [44] Location-Based Routing Algorithms for Wireless Sensor Network
    Zheng Kai
    ZTECommunications, 2009, 7 (01) : 40 - 44
  • [45] Location of wireless sensor networks based on port management system
    Tang, Chun-Ling
    Li, Min
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (02): : 595 - 599
  • [46] Efficient location-based topology control algorithms for wireless ad hoc and sensor networks
    Zhang, Baoxian
    Jiao, Zhenzhen
    Li, Cheng
    Yao, Zheng
    Vasilakos, Athanasios V.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (14): : 1943 - 1955
  • [47] Location-aware and secret share based dynamic key management scheme for wireless sensor networks
    Ma, Chunguang
    Geng, Guining
    Wang, Huiqiang
    Yang, Guang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 770 - 773
  • [48] A Key Management Scheme Based on Multi-Dimension Location for Clustered Heterogeneous Wireless Sensor Networks
    Zhang, Yuquan
    Wei, Lei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 395 - 400
  • [49] A Key Management Scheme Based on Hierarchical Wireless Sensor Networks
    Yu, Meisheng
    Miao, Yueqin
    Yu, Jing
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 42 - 49
  • [50] A Key Management Scheme for Cluster Based Wireless Sensor Networks
    Azarderakhsh, Reza
    Reyhani-Masoleh, Arash
    Abid, Zine-Eddine
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 222 - 227