Abstract
Some applications of Wireless sensor network such as military and health-care applications require high level of security. Such a level of security cannot be provided through traditional key management schemes due to resource-constrained sensor nodes. Keeping this in mind, we propose a novel key management scheme with the following design objectives: (i) reduction of computation overhead (ii) reduction of communication overhead (iii) mitigation of node capture attack and (iv) protection from clone attack and replay attack. Here, we apply Identity-based cryptography which uses bilinear pairing on elliptic curves. The security of the proposed scheme is proved through Strand Space model. The analysis and experimental results infer that the proposed scheme provides better performance as compared to other similar protocols in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
gmp library. https://www.gmplib.org/. Accessed 10 May 2017
The openssl project. https://www.openssl.org/. Accessed 10 May 2017
Pbc: Pairing based cryptography. https://www.crypto.stanford.edu/pbc/. Accessed 10 May 2017
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Yang, K., Zheng, K., Yang, Y., Guo, S.: Pairing-based key management scheme for heterogeneous sensor networks. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), p. 15. IEEE (2010)
Du, X., Xiao, Y., Ci, S., Guizani, M., Chen, H.-H.: A routing-driven key management scheme for heterogeneous sensor networks. In: IEEE International Conference on Communications, ICC 2007, pp. 3407–3412. IEEE (2007)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002)
Fabrega, F.J.T.H, Herzog, J.C., Guttman, J.D.: Strand spaces: why is a security protocol correct? In: Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998 , pp. 160–171. IEEE (1998)
Guttman, J.D., Thayer, F.J.: Authentication tests. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, 2000, pp. 96–109. IEEE (2000)
Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital sig- nature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)
Jokhio, S.H., Jokhio, I.A., Kemp, A.H.: Node capture attack detection and defence in wireless sensor networks. IET Wirel. Sens. Syst. 2(3), 161–169 (2012)
Khan, S.U., Lavagno, L., Pastrone, C., Spirito, M.A.: Online authentication and key establishment scheme for heterogeneous sensor networks. Int. J. Distrib. Sens. Netw. 2014 (2014)
Kodali, R.K., Chougule, S., Agarwal, A.: Key management technique for heterogeneous wireless sensor networks. In: 2013 IEEE TENCON Spring Conference, pp. 183–187. IEEE (2013)
Lee, J.C., Leung, V.C.M., Wong, K.H., Cao, J., Chan, H.C.B.: Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wirel. Commun. 14(5), 76–84 (2007)
Szczechowiak, P., Collier, M.: Tinyibe: identity-based encryption for heterogeneous sensor networks. In: 2009 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 319–354. IEEE (2009)
He, X., Niedermeier, M., De Meer, H.: Dynamic key management in wireless sensor networks: a survey. J. Netw. Comput. Appl. 36(2), 611–622 (2013)
Chen, C.-M., Zheng, X., Wu, T.-Y.: A complete hierarchical key management scheme for heterogeneous wireless sensor networks. Sci. World J. 2014 (2014)
Rassam, M.A., Maarof, M.A., Zainal, A.: A survey of intrusion detection schemes in wireless sensor networks. Am. J. Appl. Sci. 9(10), 1636–1652 (2012)
Acknowledgments
Authors would like to thank Nazatul Haque Sultan for his valuable suggestion.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Buragohain, M., Sarma, N. (2019). PKHSN: A Bilinear Pairing Based Key Management Scheme for Heterogeneous Sensor Networks. In: Biswas, S., et al. Communication Systems and Networks. COMSNETS 2018. Lecture Notes in Computer Science(), vol 11227. Springer, Cham. https://doi.org/10.1007/978-3-030-10659-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-10659-1_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-10658-4
Online ISBN: 978-3-030-10659-1
eBook Packages: Computer ScienceComputer Science (R0)