Abstract
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Since, key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution by using MATLAB (analytically) and by simulation (OMNET++ simulator) to show that it has less memory requirement and has good network connectivity and resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
The Wireless Sensor Network (WSN) are usually deployed in possibly remote and unattended locations they are definitely prone to security attacks. Hence to secure the network operation and securely gather and forward the information, security threats and its counter measures should be considered at design time in terms of both requirements and implementation techniques. The design of security algorithms considering the homogeneous sensor networks was the first step to secure sensor networks. However, some research work [1, 2] have shown that homogeneous sensor networks have high communication and computation overheads, high storage requirements and suffer from severe performance bottlenecks. Hence, recent research work [4, 14] introduced heterogeneous sensor networks, which consists of High-end sensors nodes (H-sensors) and Low-end sensors nodes (L-sensors). To achieve better performance and scalability, H-sensors have more resources compared to L-sensors. However, both H-Sensors and L-sensors are still highly vulnerable in nature and are exposed to several security threats and particularly prone to physical attacks. Thus, proper security mechanisms should be applied to protect these nodes against attacks. Hence, a novel key management scheme for heterogeneous sensor networks suitable for scenarios with partial mobility is presented. The proposed solution relies on two types of keys: authentication keys and secret communication codes used to generate secret keys whenever needed. The remaining of the paper is organized as follows. Section 2 presents existing work. Section 3 describes the proposed key management scheme, while in Sect. 4 describe the security analysis of the proposed scheme, and finally conclusions are provided in Sect. 5.
2 Related Work
To secure wireless sensor networks, Perrig [5] proposed SPINS, in which there a secure central entity called server which is responsible for establishing a key among the sensor nodes. Since it is based on centralized base station approach, the failure of base station severely affects the performance of network. To overcome the above mentioned issue, a randomly key distributed approach is proposed by Eschenauer and Gligor [3]. In this scheme, there is no centralized entity like a base station for key distribution and management. Each node in the network is assigned a set of randomly selected keys from a large key set. Since the keys are distributed randomly, the two communicating nodes need to have at least one common key in their sets for secure communication. To further improve the network security, sharing of at least q-keys concept for establishing a secret key is introduced by Chan [6]. The prior knowledge of node’s deployment in the network helps in increasing the network connectivity and reduce the memory requirements [7] combined with the Rabin’s scheme [15]. To achieve better security and network connectivity with less memory requirements with low computational cost, NPKPS scheme is proposed by Zhang [8] for wireless sensor networks. To reduce the memory cost, Kim [9] introduced a level-based key management scheme while a two-layered dynamic key management for clustered based wireless sensor networks is presented by Chuang [10].
The management of secret keys (MASY) protocol is presented by Maerien in [11] which is based on the trust assumption among the networks managers/base stations. To further improve the network connectivity and reduce the memory requirements of the symmetric key distribution approaches, Du [4] presents an asymmetric key pre-distribution (AP) approach. Du sensor network model consists of two different types of nodes making it a Heterogeneous Sensor Networks (HSNs). This assumption significantly increases the network connectivity and reduces memory requirements compared to the existing symmetric key management approaches. Lu [12] proposes a framework for key management schemes in distributed peer-to-peer wireless sensor networks with heterogeneous sensor nodes and shows by simulation that heterogeneity results in higher connectivity and higher resilience. Du [13] proposes a routing-driven key management scheme for heterogeneous wireless sensor networks, based on Elliptic Curve Cryptography (ECC), which provides better security with significant reduction of memory overhead.
The considered network model is a Heterogeneous Sensor Network (HSN) composed base station and H-sensors (fixed) while L-sensors are Mobile Nodes (MNs). The virtual network organization is shown in Fig. 1.
3 Proposed Scheme
First we describe a list of abbreviations used in the proposed solution. Since the proposed key management scheme is built on top of the above network model to provide effective authentication and dynamic key establishment. The key material is generated at the BS. More specifically, a large key pool \(KP_{mail}\) is created and then divided into two sub key pools \(KP_{FN}\) and \(KP_{MN}\) such that \(KP_{FN} \cap KP_{FN} = \emptyset \).
The key pool \(KP_{FN}\) is used by the FNs of the network while the key pool \(KP_{MN}\) is used by the MNs of the network for the secret key establishment. For authentication purposes, Elliptic Curve Cryptography (ECC) is used during the initialization phase for key generation. Three different phases have been taken into account
-
1.
Key pre-distribution to the different sensor nodes i.e. FNs and MNs
-
2.
Node authentication
-
3.
Communication key establishment among the nodes within the network.
Further details will be provided in the following subsections.
3.1 Key Pre-distribution
As already mentioned, in our proposed scheme, the key material is organized at the BS in a large key pool \(KP_{main}\) which is then randomly divided into key pool \(KP_{FN}\) and into key pool \(KP_{MN}\) such that \(KP_{FN} \cap KP_{MN} = \emptyset \). Now each FN \(i\) is assigned a randomly selected key pool \(KP_{FN_{i}}\) from the key pool \(KP_{FN}\) where \(KP_{FN_{i}} << KP_{FN}\) and contains \(|KP_{FN_{i}}|\) keys while each MN \(j\) is assigned a randomly selected key pool \(KP_{MN_{j}}\) from the key pool \(KP_{MN}\) where \(KP_{MN_{j}} << KP_{MN}\) and contains \(|KP_{MN_{j}}|\) keys. Since these two key pools are disjoint, \(KP_{FN_{i}} \cap KP_{MN_{j}} = \emptyset \). These assigned key pools will be used by the FNs and by the MNs for the establishment of a secret communication key using the assigned key generation algorithm.
Concerning the authentication key material, each FN and each MN is assigned an elliptic curve \(E(a,b)\) over a finite Galois field \(F(G)\) and a base point G along with a unique authentication code \(AUTH\). Each FN and each MN is also assigned an ECC-based public/private key pair (\(K_{plc}, K_{prt}\)) and a prime number generator (\(prand()\)).
As previously described, FNs and the BS compose the fixed infrastructure of the overall heterogeneous sensor network; they are powerful devices and play an important role in authentication and key management. In order to maintain the availability of these services and to avoid the full network being compromised by attackers, a higher level of security is thus required for FNs and the BS. As a consequence, the authentication of FNs to the network and the communication between the FNs and between a FN and the BS will be based on a standard ECC-based private/public key mechanism. Accordingly, each FN has its own private key and the public key of the BS and of all the other FNs of the network. At the same time, the BS has the public keys of all the FNs.
All the previously introduced key material is transferred to each node of the network by means of secure side channels. Then, after this pre-distribution phase, the specific key material assigned to each type of node of the network is as follows:
-
the BS owns all the key material that needs to be pre-distributed (plus, as already described, the public key of each FN),
-
each FN \(i\) has been given \(E(a,b)\), \(G\) and \(AUTH_i\) for authentication purposes and key pool \(KP_{FN_{i}}\) for communication key establishment,
-
each MN \(j\) has been given \(E(a,b)\), \(G\) and \(AUTH_j\) for authentication purposes and \(KP_{MN_{j}}\) for communication key establishment.
3.2 Node Authentication
After the deployment and key pre-distribution phase, each FN of the network broadcasts periodic Hello messages. This mechanism enables each FN to fill a table with all neighboring MNs. The FN ID is included in the Hello message along with a random nonce signed by the FN’s private key. Upon the reception of those Hello messages, each MN selects a FN as its Cluster Head (CH), e.g. the one with the highest signal strength, after the verification of Hello message by using the FN public key. Since Hello message verification is a part of the authentication phase, at this point the authentication phase among the FNs and the MNs can start. To this aim, each \(MN_j\) authenticates the Hello message of the selected \(FN_i\) as a CH as follow: First \(MN_j\) uses the \(FN_i\) ID and generates a prime number \(PRM_{FN_i}\) using the prime number generator prand()
After the generation of \(PRM_{FN_i}\), the \(MN_j\) generates the public key of the \(FN_i\) using the scalar multiplication as
Then the \(MN_j\) can verify the Hello message signature. Successful verification of the Hello message signature authenticates the CH i.e. \(FN_i\) to the \(MN_j\). The MN then calculates the scalar product of the assigned authentication code \(AUTH_j\) and its private key as
Then the \(MN_j\) sends a joining request including its ID, \(SP_{MN_{j}}\), and the nonce it had received from the CH back to its selected CH, all signed by its private key. After receiving the \(MN_j\)’s joining request message, the \(FN_i\) first authenticates \(MN_j\) before registering it as a trusted cluster member. The \(FN_i\) follows the same procedure as the \(MN_j\) did to check the authenticity of the received messages. First the \(FN_i\) use the \(MN_j\) ID and generate a prime number \(PRM_{MN_j}\) using the prime number generator prand()
After the generation of \(PRM_{MN_j}\), the \(FN_i\) generates the public key of the \(MN_j\) using scalar multiplication as
After the generation of the \(MN_j\) public key, the \(FN_i\) verifies the joining message signature. Successful verification and reception of the correct nonce ensure that the \(MN_j\) is an authentic mobile node belonging to the network. The CH registers this \(MN_j\) into its authentic MN member list and calculates the scalar product of \(AUTH_i\) and its private key as
Finally the CH generates an authentication certificate for this MN using \(SP_{MN_j}\) and \(SP_{FN_i}\) as
The \(CH\) sends \(SP_{FN_i}\) to the \(MN_j\) which uses in the secret key generation and for the authentication certificate generation.
3.3 Communication Key Establishment
Once the MN and CH/FN authenticate each other successfully, the key establishment phase starts. During this phase, the MN sends one of its secret communication codes \(SCC_1\), randomly selected from \(KP_{MN}\) and encrypted by the CH public key to its CH as described above. The CH also selects randomly another secret communication code \(SCC_2\) from its pool \(KP_{FN}\) and sends it to the corresponding MN. After the reception of this secret code by the MN, the MN and the FN both have the same \(SCC_1\) and \(SCC_2\) and are able to generate a secret key using these two codes, \(SP_{MN_j}\) and \(SP_{FN_i}\) using [15] as
Once a secret key is established between the CH and each MN, the CH has assigned a Shared Secret Code (SSC) to its all member MNs. This shared secret code is updated both periodically and when a MN compromission is detected. Since the MNs move in the network to perform their duties, they may need to establish a secure communication link also with neighboring MNs, possibly very frequently due to their movement within the network. In order to keep track of their neighboring MNs, each MN broadcasts a short range Hello message to know about its neighboring MNs. To establish a secret key with a neighboring MN, both MNs will share their secret communication code IDs assigned to them as \(KP_{MN}\). Now both the MNs will find the maximum number of shared codes with one another and will generate a secret key using all of them as
where ‘f’ represents the total number of common secret communication codes. Since the distributions of the \(SCC_1\) codes to the MNs is random and probabilistic, two neighboring MNs might not have any secret communication code in common. In this case, to avoid any discontinuity, the MNs will use the assigned Shared Secret Code (SSC) from their common CH and their IDs to establishment a secret key with its neighboring MNs. For example, if \(MN_m\) wants to establish a secret key with \(MN_n\) but these two nodes do not have any common secret communication code (SCC), then they establish a secret key by first calculating and sharing L and K with each other as
4 Security Evaluation
4.1 Denial of Service Attack
In this section we describe some kind of Denial of Service attacks (DoS attacks) that can be brought against our proposed scheme, as well as possible counter measures. The main objective of DoS attacks is to make the resources unavailable to an intended user of the network.
-
1.
FN Hello messages: The first possible DOS attack against the proposed scheme is to broadcast Hello messages pretending to be a FN of the network to exhaust the resources of the MNs. Since each Hello message is signed by the private key of the FN, MNs will verify it using the public key of that FN. Since the adversary FN is not an authentic node, the MN would not be able to verify that Hello message and once a MN detects this attack, it will inform its other neighboring authentic FNs. The authentic FNs would then inform the BS and neighboring MNs about this fake FN ID so that they can avoid the messages from that node.
-
2.
MN Hello messages: When a MN finds its current CH signal strength value below a threshold value, it starts broadcasting the MN Hello messages to know about its new neighboring FNs. The attacker can launch such MN Hello message broadcast attack by introducing a fake MN. Since the MN Hello broadcast message is also signed by the MN private key, the new FNs first verify it by using the MN public key. This would not be possible for a fake MN. Thus the FNs inform the BS and other neighboring FNs about this malicious MN.
4.2 Sybil Attack
Sybil attacks are those in which a malicious node illegitimately taking on multiple identities. We call the nodes performing these attacks as sybil nodes. Sybil attacks can be of different forms e.g. using direct or indirect communication and fabricated or stolen identities. In the direct communication sybil attacks, a Sybil node communicates directly with a legitimate node. But since, in the proposed scheme, the sybil node is first authenticated by sending a message signed with its private key, the FN would not be able to authenticate it. In the indirect communication sybil attacks, malicious node (who deploy sybil nodes in the network) becomes a router for forwarding the communication to the Sybil node from the FN which is not possible in the proposed scheme because each MN is the end user of the network. In the fabricated sybil attacks, the attacker assigns an unuse identity to the sybil node. In this case, this sybil node needs to authenticate itself to the FNs which would again not be possible in the proposed scheme as described above. Stolen identity based sybil attacks are very dangerous in such resource constrained networks. But this type of sybil attack does not affect the proposed scheme because each communication is encrypted with the key agreed already with the original node having this ID, and the sybil node does not have these keys.
In the key pre-distribution approach, if every MN is assigned \(KP_{MN}\) keys and every FN is assigned \(KP_{FN}\) keys from a key pool of size \(KP_{main}\) and an attacker compromises ‘c’ nodes to create a compromised key pool of size ‘n’, then the probability of a sybil node to be successful created is
Figure 2 shows the probability of successfully generated sybil nodes in the proposed scheme compared with scheme [7, 9].
4.3 Node Compromission
Each node is secured by hardware means against access to its keys. However, no such scheme is ever perfect; hence here we analyze the effects of such attacks on our key management scheme.
In existing key pre-distribution schemes for both homogeneous and heterogeneous sensor networks, each node is assigned a key pool, and for secure communication the two nodes must have a shared common key. In that case, once the node is compromised by an adversary, it can compromise all the secure links with neighbors with whom this node has a shared key. Thus the total number of communication links compromised by capturing \(c\) MNs are given by
where \(|KP_{MN_j}|\) is the number of keys stored in the MN and \(|KP_{MN}|\) is the size of the authentication key pool from which \(KP_{MN_j}\) is randomly selected for each MN. Figure 3 shows both the analytical and OMNET++ simulation results of the effect of this kind of attack on our proposed scheme compared with the key pre-distribution scheme in [3, 4, 8, 16]. The graph shows that our scheme provides almost, 100 % resilience against this kind of attack.
5 Conclusion
In this paper, we proposed a new authentication and key management scheme for Heterogeneous Sensor Networks including mobile nodes. The proposed key management scheme is based on two different types of the key pools i.e. an authentication key pool and a communication key pool. Based on these pools, a key pre-distribution mechanism has been defined. The results showed that the two considered key pools provide better security. Furthermore, the proposed solution provides better network resilience against attacks compared to the other reference protocols considered.
References
Xiao, Y., Rayi, V., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. J. Spec. Issue Wirel. Ad Hoc Sens. Netw. 30(11–12), 2314–2341 (2007)
Xu, K., Hong, X., Gerla, M.: An ad hoc network with mobile backbones. In: 2002 IEEE International Conference on Communications, ICC 2002, vol. 5, pp. 3138–3143 (2002). doi:10.1109/ICC.2002.997415
Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47, November 2002
Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007)
Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. ACM Wirel. Netw. 8(5), 521–534 (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 Symposium on Security and Privacy, 11–14 May 2003, pp. 197–213 (2003). doi:10.1109/SECPRI.2003.1199337
Liu, F., Rivera, M.J.M., Cheng, X.: Location-aware key establishment in wireless sensor networks. In: IWCMC 2006 (2006)
Zhang, J., Sun, Y., Liu, L.: NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks. In: 2007 IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN 2007), pp. 446–449, 12–14 December 2007
Kim, K.T., Ramakrishna, R.S.: A level-based key management for both in-network processing and mobility in WSNs. In: 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1–8, 8–11 October 2007. doi:10.1109/MOBHOC.2007.4428761
Chuang, I.-H., Su, W.-T., Wu, C.-Y., Hsu, J.-P., Kuo, Y.-H.: Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks. In: 2007 Wireless Communications and Networking Conference, WCNC 2007. IEEE, pp. 4145–4150, 11–15 March 2007. doi:10.1109/WCNC.2007.757
Maerien, J., Michiels, S., Huygens, C., Joosen, W.: MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks. In: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 121–128, 11–13 October 2010. doi:10.1109/WIMOB.2010.5644977
Lu, K., Qian, Y., Hu, J.: A framework for distributed key management schemes in heterogeneous wireless sensor networks. In: 2006 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006, pp. 7–520, 10–12 April 2006. doi:10.1109/.2006.1629447
Du, X., Xiao, Y., Ci, S., Guizani, M., Chen, H.-H.: A routing-driven key management scheme for heterogeneous sensor networks. In: 2007 IEEE International Conference on Communications, ICC 2007, pp. 3407–3412, 24–28 June 2007. doi:10.1109/ICC.2007.564
Yang, Q., Li, Q., Li, S.: An efficient key management scheme for heterogeneous sensor networks. In: 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008, pp. 1–4, 12–14 October 2008. doi:10.1109/WiCom.2008.896
Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. Technical report MIT/LCS/TR-212, Laboratory for Computer Science, MIT (1979)
Sarmad, U.K., Lavagno, L., Pastrone, C.: A key management scheme supporting node mobility in heterogeneous sensor networks. In: 2010 6th International Conference on Emerging Technologies (ICET), pp. 364–369, 18–19 October 2010. doi:10.1109/ICET.2010.5638458
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Khan, S., Khan, R. (2015). A Secure Authentication and Key Management Scheme for Wireless Sensor Networks. In: Kanjo, E., Trossen, D. (eds) Sensor Systems and Software. S-CUBE 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 143. Springer, Cham. https://doi.org/10.1007/978-3-319-17136-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-17136-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17135-7
Online ISBN: 978-3-319-17136-4
eBook Packages: Computer ScienceComputer Science (R0)