Skip to main content

PKHSN: A Bilinear Pairing Based Key Management Scheme for Heterogeneous Sensor Networks

  • Conference paper
  • First Online:
Communication Systems and Networks (COMSNETS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 11227))

Included in the following conference series:

  • 365 Accesses

Abstract

Some applications of Wireless sensor network such as military and health-care applications require high level of security. Such a level of security cannot be provided through traditional key management schemes due to resource-constrained sensor nodes. Keeping this in mind, we propose a novel key management scheme with the following design objectives: (i) reduction of computation overhead (ii) reduction of communication overhead (iii) mitigation of node capture attack and (iv) protection from clone attack and replay attack. Here, we apply Identity-based cryptography which uses bilinear pairing on elliptic curves. The security of the proposed scheme is proved through Strand Space model. The analysis and experimental results infer that the proposed scheme provides better performance as compared to other similar protocols in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. gmp library. https://www.gmplib.org/. Accessed 10 May 2017

  2. The openssl project. https://www.openssl.org/. Accessed 10 May 2017

  3. Pbc: Pairing based cryptography. https://www.crypto.stanford.edu/pbc/. Accessed 10 May 2017

  4. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  5. Yang, K., Zheng, K., Yang, Y., Guo, S.: Pairing-based key management scheme for heterogeneous sensor networks. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), p. 15. IEEE (2010)

    Google Scholar 

  6. Du, X., Xiao, Y., Ci, S., Guizani, M., Chen, H.-H.: A routing-driven key management scheme for heterogeneous sensor networks. In: IEEE International Conference on Communications, ICC 2007, pp. 3407–3412. IEEE (2007)

    Google Scholar 

  7. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002)

    Google Scholar 

  8. Fabrega, F.J.T.H, Herzog, J.C., Guttman, J.D.: Strand spaces: why is a security protocol correct? In: Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998 , pp. 160–171. IEEE (1998)

    Google Scholar 

  9. Guttman, J.D., Thayer, F.J.: Authentication tests. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, 2000, pp. 96–109. IEEE (2000)

    Google Scholar 

  10. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital sig- nature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)

    Article  Google Scholar 

  11. Jokhio, S.H., Jokhio, I.A., Kemp, A.H.: Node capture attack detection and defence in wireless sensor networks. IET Wirel. Sens. Syst. 2(3), 161–169 (2012)

    Article  Google Scholar 

  12. Khan, S.U., Lavagno, L., Pastrone, C., Spirito, M.A.: Online authentication and key establishment scheme for heterogeneous sensor networks. Int. J. Distrib. Sens. Netw. 2014 (2014)

    Google Scholar 

  13. Kodali, R.K., Chougule, S., Agarwal, A.: Key management technique for heterogeneous wireless sensor networks. In: 2013 IEEE TENCON Spring Conference, pp. 183–187. IEEE (2013)

    Google Scholar 

  14. Lee, J.C., Leung, V.C.M., Wong, K.H., Cao, J., Chan, H.C.B.: Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wirel. Commun. 14(5), 76–84 (2007)

    Article  Google Scholar 

  15. Szczechowiak, P., Collier, M.: Tinyibe: identity-based encryption for heterogeneous sensor networks. In: 2009 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 319–354. IEEE (2009)

    Google Scholar 

  16. He, X., Niedermeier, M., De Meer, H.: Dynamic key management in wireless sensor networks: a survey. J. Netw. Comput. Appl. 36(2), 611–622 (2013)

    Article  Google Scholar 

  17. Chen, C.-M., Zheng, X., Wu, T.-Y.: A complete hierarchical key management scheme for heterogeneous wireless sensor networks. Sci. World J. 2014 (2014)

    Google Scholar 

  18. Rassam, M.A., Maarof, M.A., Zainal, A.: A survey of intrusion detection schemes in wireless sensor networks. Am. J. Appl. Sci. 9(10), 1636–1652 (2012)

    Article  Google Scholar 

Download references

Acknowledgments

Authors would like to thank Nazatul Haque Sultan for his valuable suggestion.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madhurima Buragohain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Buragohain, M., Sarma, N. (2019). PKHSN: A Bilinear Pairing Based Key Management Scheme for Heterogeneous Sensor Networks. In: Biswas, S., et al. Communication Systems and Networks. COMSNETS 2018. Lecture Notes in Computer Science(), vol 11227. Springer, Cham. https://doi.org/10.1007/978-3-030-10659-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-10659-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-10658-4

  • Online ISBN: 978-3-030-10659-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics