Abstract
The vulnerable environment and open communication channel make it very necessary to protect wireless sensor networks (WSNs). The key management is the most important way to protect the communication in WSNs. In this paper, we design a Multihop-based Key Management (MKM) which can efficiently enhance the security and survivability in the hierarchical WSNs. Different from previous works, we present the key system as well as the cluster formation. The MKM generates and distributes keys based on hop counts, which not only localizes the key things but also has no overhead. The MKM provides the session keys among sensors and the cluster key between the cluster head and its member nodes. The different hops make the different keys. The MKM can protect the network from the compromised nodes by reducing the high probability of the common keys. The security analysis can effectively prevent several attacks.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Zhou, Y.: Securing Wireless sensor networks: A Survey. IEEE Communications Surveys & Tutorials (3rd Quarter, 2008)
Banihashemian, S., Ghaemi Bafghi, A.: A new key management scheme in heterogeneous wireless sensor networks. In: Proceeding ICACT 2010, Korea (2010)
Anjum, F.: Location dependent key management in sensor networks using without using deployment knowledge. In: Proceedings of WiSe 2006 (2006)
Du, X., Xiao, Y., Guizani, M., Chen, H.-H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks 5(1), 24–34 (2007)
Banihashemian, S., Bafghi, A.G.: Alternative shared key replacement in heterogeneous wireless sensor networks. In: Proceeding IEEE Computer Society (2010)
Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: A Secure Sensor Network Communication Architecture. In: IPSN 2007 (April 2007)
Zhu, S., Setia, S., Jaodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Transactions on Sensor Networks 2(4), 500–528 (2006)
Abbasi, A.A., Younis, M.: A survey on clustering algorithms for wireless sensor networks. Computer Communications 30, 2826–2841 (2007)
Bandyopadhyay, S., Coyle, E.J.: An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks. In: Proceeding of IEEE INFOCOM 2003, San Francisco (April 2003)
Handy, M.J., Haase, M., Timmermann, D.: Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: Mobile and Wireless Communications Networks, pp. 368–372. IEEE Communications Society, Stockholm (2002)
Manjeshwar, A., Grawal, D.P.: TEEN: A protocol for enhanced effciency in wireless sensor networks. In: PDPS 2001, pp. 2009–2015. IEEE Computer Society, San Francisco (2001)
Abdalla, M., Bellare, M.: Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 546–559. Springer, Heidelberg (2000)
Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004: Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 1. IEEE (2004)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of Symposium on Security and Privacy, pp. 197–213. IEEE (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Y., Li, X., Zhen, Y., Zeng, L. (2012). Multihop-Based Key Management in Hierarchical Wireless Sensor Network. In: Li, R., Cao, J., Bourgeois, J. (eds) Advances in Grid and Pervasive Computing. GPC 2012. Lecture Notes in Computer Science, vol 7296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30767-6_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-30767-6_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30766-9
Online ISBN: 978-3-642-30767-6
eBook Packages: Computer ScienceComputer Science (R0)