International Journal of Applied Science and Engineering
Published by Chaoyang University of Technology

Venkatesh Arumugam*, Asha Seshasayanam

School of Computing Science and Engineering, VIT University, Chennai Campus, India


Download Citation: |
Download PDF


ABSTRACT


A Key management system plays an important role in the process of wireless communication between the nodes of a Wireless Sensor Network (WSN). Unlike the wired networks, WSNs are more vulnerable to attacks from the malicious nodes. To overcome the shortcomings of the existing key management systems, this paper proposes an adaptive multilevel location-based key management system (AML-KBS), in which the keys are generated dynamically and shared among the nodes of the wireless networks. Since the proposed approach follows a location-based system for key management, the attackers can be differentiated based upon their location. Also, the proposed system has proven its withstanding against node capture attacks. Comparing with the existing approaches, the memory requirement of the proposed system has shown better improvement. Moreover, the proposed methodology provides better security mechanism than the existing key management systems.


Keywords: Key management, Wireless sensor networks, Node capture attack, Local node attacks.


Share this article with your colleagues

 


REFERENCES


  1. Abdollahzadeh, S., Navimipour, N.J. 2016. Deployment strategies in the wireless sensor network: a comprehensive review, Computer Communications 91, 1–16. https://doi.org/10.1016/j.comcom.2016.06.003.

  2. Afsar, M.M., Tayarani-N, M.-H. 2014. Clustering in sensor networks: A literature survey, Journal of Network and Computer Applications 46, 198–226. https://doi.org/10.1016/j.jnca. 2014.09.005.

  3. Alotaibi, M. 2018. An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN, IEEE Access, 6, 70072–70087.

  4. Anjum, F. 2010. Location dependent key management in sensor networks without using deployment knowledge, Wireless Netw., 16, 1587–1600.

  5. Annapurna, H., Siddappa, M. 2015. A technique for multi-tier key distribution for securing group communication in wsn, in: Emerging Research in Computing, Information, Communication and Applications, Springer, 273–279. https://doi.org/10.1007/978-81-322-2550-8_26.

  6. Bekara, C., Laurent-Maknavicius, M. 2009. Key management in wireless sensor networks, Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies, 613–648.

  7. Chakavarika, T.T., Gupta, S.K., Chaurasia, B.K. 2017. Energy efficient key distribution and management scheme in wireless sensor networks, Wireless Personal Communications 97, 1059–1070. https://doi.org/10.1007/s11277-017-4551-2.

  8. Chan, H., Perrig, A., Song, D. 2003. Random key predistribution schemes for sensor networks, Proc. IEEE Symp. Security and Privacy (SP ’03), 197–213.

  9. Choi, J., Bang, J., Kim, L.H., Ahn, M., Kwon, T. 2018. Location-based key management strong against insider threats in wireless sensor networks, IEEE Systems Journal.

  10. Erfani, S.H., Javadi, H.H., Rahmani, A.M. 2015. A dynamic key management scheme for dynamic wireless sensor networks, Security and Communication Networks 8, 1040–1049. https://doi.org/10.1002/sec.1058.

  11. Eschenauer, L., Gligor, V.D. 2002. A key-management scheme for distributed sensor networks, in Proc. ACM Conf. Computer and Communication Security, 41–47.

  12. Eschenauer, L., Gligor, V.D. 2002. A key-management scheme for distributed sensor networks, in Proc. ACM Conf. Computer and Communication Security, 41–47.

  13. Ferng, H.-W., Nurhakim, J., Horng, S.-J. 2014. Key management protocol with end-to-end data security and key revocation for a multi-bs wireless sensor network, Wireless Networks 20, 625–637. https://doi.org/10.1007/s11276-013-0627-4.

  14. Gandino, F., Ferrero, R., Montrucchio, B., Rebaudengo, M. 2016. Fast hierarchical key management scheme with transitory master key for wireless sensor networks, Filippo Gandino; Renato Ferrero; Bartolomeo Montrucchio; Maurizio Rebaudengo IEEE Internet of Things Journal, 3, 1334–1345.

  15. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S. 2004. Comparing elliptic curve cryptography and RSA on 8-Bit CPUs, Proc. Sixth Int’l Workshop Cryptographic Hardware and Embedded Systems (CHES ’04), 119–132.

  16. Huang, J.-M., Yang, S.-B., Dai, C.-L. 2013. An efficient key management scheme for data-centric storage wireless sensor networks, IERI Procedia 4, 25–31. https://doi.org/10.1016/j. ieri.2013.11.005.

  17. Lee, J.C., Leung, V.C.M., Wong, K.H., Cao, J. 2007. Key management issues in wireless sensor networks: Current proposals and future developments, IEEE Wireless Communications, 14, 76–84.

  18. Merkle, R. 1978. Secure communication over insecure channels, Commun. ACM, 21, 294–299.

  19. Messai, M.-L., Seba, H., Aliouat, M. 2015. A new hierarchical key management scheme for secure clustering in wireless sensor networks, in: International Conference on Wired/Wireless Internet Communication, Springer, 411–424. https://doi.org/10.1007/978-3-319-22572-2_30.

  20. Nikooghadam, M., Amintoosi, H. 2020. Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme, International Journal of Communication Systems, p. e4332.

  21. Seo, S., Bertino, E. 2013. Eliptic curve cryptography based certificateless hybrid signcryption scheme without pairing, CERIAS Technical Report 2013, https://www.cerias.purdue.edu/apps/reports and papers/. Seung-Hyun.

  22. Seo, S.-H., Won, J., Sultana, S., Bertino, E. 2015. Effective key management in dynamic wireless sensor networks, IEEE Transactions on Information Forensics and Security 10, 371–383. https://doi.org/10.1109/TIFS.2014.2375555.

  23. Seo, S.-H., Won, J., Sultana, S., Bertino, E. 2015. Effective key management in dynamic wireless sensor networks, IEEE Transactions on Information Forensics and Security, 10, 371–383.

  24. Shin, S., Kwon, T. 2019. A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes, Sensors, 19, 2012.

  25. Simpl´ıcio-Jr., M.A., Barreto, P.S., Margi, C.B., Carvalho, T.C. 2010. A survey on key management mechanisms for distributed wireless sensor networks, Comput. Networks, 54, 2591–2612.

  26. Thevar, G.K.C., Rohini, G. 2017. Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks, Wireless Networks 23, 1479–1489. https://doi.org/10.1007/s11276-016-1228-9.

  27. Wang, H., Li, Q. 2006. Efficient implementation of public key cryptosystems on mote sensors, Proc. Eighth Int’l Conf. Information and Comm. Security (ICICS ’06), 519–528.

  28. Zhang, J., Varadharajan, V. 2010. Wireless sensor network key management survey and taxonomy, J. Netw. Comput. Applications, 33, 63–75.

  29. Zhang, Y., Li, X., Liu, J., Yang, J., Cui, B. 2017. A secure hierarchical key management scheme in wireless sensor network, International Journal of Distributed Sensor Networks 8, 547471. https://doi.org/10.1155/2012/547471.

  30. Zhu, S., Setia, S., Jajodia, S. 2006. Leap+: Efficient security mechanisms for large-scale distributed sensor networks, ACM Trans. Sensor Netw., 2, 500–528.


ARTICLE INFORMATION


Received: 2020-09-04

Accepted: 2020-11-29
Available Online: 2021-03-01


Cite this article:

Arumugam, V., Asha S. 2021. An adaptive multilevel location based key management system for dynamic wireless sensor networks. International Journal of Applied Science and Engineering, 18, 2020177. https://doi.org/10.6703/IJASE.202103_18(1).008

  Copyright The Author(s). This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are cited.