Abstract
Wireless sensor networks are envisaged in military, commercial and healthcare applications, where data security is an important aspect. Security of the data in the network is based on the cryptographic technique and the way in which encryption and decryption keys are established among the nodes. Managing the keys in the network includes node authentication, key agreement and key update phases which poses an additional overhead on network resources. Both Symmetric and Asymmetric key techniques when applied separately in WSN fails to provide a scheme suitable for wide range of applications. Hybrid key management scheme is scalable alternative to match security requirements of WSN with minimum overhead on available resources. Heterogeneous WSN is considered in which ID based key establishment and polynomial based key pre-distribution scheme are proposed for higher and lower level of hierarchy respectively. The results of the proposed hybrid key management scheme indicate reduced resource overhead and improved security level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer Networks 54(15), 2787–2805 (2010)
William, S., et al.: Cryptography and Network Security, 4/e. Pearson Education India (2006)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography. Springer (2004)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 197–213. IEEE (2003)
Shan, T., Liu, C.: Enhancing the key pre-distribution scheme on wireless sensor networks. In: IEEE Asia-Pacific Services Computing Conference, APSCC 2008, pp. 1127–1131. IEEE (2008)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Rasheed, A., Mahapatra, R.: Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Transactions on Parallel and Distributed Systems 22(1), 176–184 (2011)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Balfe, S., Boklan, K.D., Klagsbrun, Z., Paterson, K.G.: Key refreshing in identity-based cryptography and its applications in manets. In: IEEE Military Communications Conference, MILCOM 2007, pp. 1–8. IEEE (2007)
Saab, S., Kayssi, A., Chehab, A.: A decentralized energy-aware key management scheme for wireless sensor networks. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 504–508. IEEE (2011)
Jian-wei, J., Jian-hui, L.: Research on key management scheme for wsn based on elliptic curve cryptosystem. In: First International Conference on Networked Digital Technologies, NDT 2009, pp. 536–540. IEEE (2009)
Doyle, B., Bell, S., Smeaton, A., Mccusker, K., O’Connor, N.: Security considerations and key negotiation techniques for power constrained sensor networks. The Computer Journal 49(4), 443–453 (2006)
Scott, M.: Miracl–multiprecision integer and rational arithmetic c/c++ library. Shamus Software Ltd., Dublin, Ireland (2003), http://www.shamus.ie
Oliveira, L., Scott, M., Lopez, J., Dahab, R.: Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. In: 5th International Conference on Networked Sensing Systems, INSS 2008, pp. 173–180 (June 2008)
McCusker, K., O’Connor, N.E.: Low-energy symmetric key distribution in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing 8(3), 363–376 (2011)
Barreto, P., Galbraith, S., hÉigeartaigh, C., Scott, M.: Efficient pairing computation on supersingular abelian varieties. Designs, Codes and Cryptography 42(3), 239–271 (2007)
Szczechowiak, P., Kargl, A., Scott, M., Collier, M.: On the application of pairing based cryptography to wireless sensor networks. In: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 1–12. ACM (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kodali, R.K., Chougule, S. (2013). Hybrid Key Management Technique for WSN’s. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_74
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)