Skip to main content

A Hierarchical Shared Key Algorithm in Wireless Sensor Networks

  • Conference paper
  • First Online:
Book cover Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

Abstract

Wireless sensor networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. However, due to the influence of environment and dynamic topology, the communication radiuses of all nodes are not strictly consistent, which may cause different neighbor numbers and redundant neighbors for each central node. In this paper, we present a key agreement scheme without the trusted third parties by exploiting the special characteristics of Hopfield neural network: the two nodes converge in a steady state from their initial states respectively after iterating finite times, while maintaining the confidentiality of the key by quantifying the key to strings. Compared to existing solutions, the proposed method requires less memory and has lower communication overheads to key agreement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ang, G., Wei, W., Zhixiao, W., Yan, W.: A hierarchical authentication scheme for the different radio ranges sensor network. In: 2009 International conference on Computational Science and Engineering, pp. 494–501 (2009)

    Google Scholar 

  2. Hailun, T., Sanjay, J., Diet, O., John, Z., Vijay, S.: Secure multi-hop network programming with multiple one-way key chains. In: Proceeding of the First ACM Conference on Wireless Network Security, pp. 206–211 (2008)

    Google Scholar 

  3. Ang, G., Wei, W., Zhi, W.: Hopfield-association: establishing a shared key in the wireless sensor networks. In: 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 70–73 (2010)

    Google Scholar 

  4. Deng, J., Han, R., Mishra, S.: Defending against path-based dos attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 195–199 (2005)

    Google Scholar 

  5. Deb, B., Bhatnagar, S., Nath, B.: ReInForM:Reliable information forwarding using multiple paths in sensor networks. In: 28th Annual IEEE Conference on Local Computer Networks, pp. 350–354 (2003)

    Google Scholar 

  6. Heinzelman, W.R., Chandrakasan, A., Balarkrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 36–49 (2002)

    Article  Google Scholar 

  7. Chan, H., Perrig, A., Song, D.: Random Key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 56–67 (2003)

    Google Scholar 

  8. Suhas, M., Wade, T., Narayan, M., Chunxuna, Y., Alex, R.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM MobiCom, pp. 236–242 (2008)

    Google Scholar 

  9. Chang, C.C., Chang, Y.F.: Efficient anonymous auction protocol with freewheeling bids. Comput. Secur. 22(8), 728–734 (2003)

    Article  Google Scholar 

  10. Jiang, R., Pan, L., Li, J.H.: An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2), 169–174 (2005)

    Article  Google Scholar 

  11. Ye, F., Luo, H, Lu, S., Zhang, L.: Statistical route-filtering of injected false data in sensor networks. In: Proceeding IEEE INFOCOM, pp. 453–457 (2004)

    Google Scholar 

  12. Hwang, M.S., Lu, J.L., Lin, C.: Adding timestamps to the electronic auction protocol. Data Knowl. Eng. 40(2), 155–162 (2002)

    Article  MATH  Google Scholar 

  13. Horng, T.L., Wen, S.J., Chi, K.L.: An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2), 1487–1497 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  14. Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 126–135 (1994)

    Article  Google Scholar 

  15. Rivest, R.L., Shamir, A., Adleman, M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 489–499 (1982)

    MathSciNet  MATH  Google Scholar 

  16. Housley, R., Hoffman, P.: Internet X.509 pubic key infrastructure operational protocols: FTP and HTTP. IEEE Commun. 203–227 (1999)

    Google Scholar 

  17. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM Mobicom 2008, pp. 522–530 (2008)

    Google Scholar 

  18. Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wirel. Netw. 10(2), 1254–1263 (2002)

    Google Scholar 

  19. Perrig, A., Szewczyk, V., Wen, D.C., Tygar, J.D.: SPINS: security protocols for sensor networks. J. Wirel. Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  20. Savo, G.G.: Optimal Transmission Radius in Sensor Networks. Advanced Wireless Sensor Network: 4G Technologies, pp. 568–571. Wiley, New York (2006)

    Google Scholar 

  21. Whit, D., Martin, H.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 962–977 (2010)

    MathSciNet  Google Scholar 

  22. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS 2002, pp. 520–523 (2002)

    Google Scholar 

  23. Xu, Y., Heidemann, E.J.: Geography-informed energy conservation for ad hoc routing. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 56–59 (2001)

    Google Scholar 

  24. Liming, S., Guiming, G.: A survey on energy efficient protocols for wireless. Commun. China Comput. Fed. (CCF) 7(4), 13–16 (2002)

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by Projects (61170245, U1304603) supported by the National Natural Science Foundation of China; Project (2014B520099) supported by Henan Province Education Department Natural Science Foundation; Project (142102210471, 142102210063, 142102210568) supported by Natural Science and Technology Research of Foundation Project of Henan Province Department of Science; Projects (1401037A) supported by Natural Science and Technology Research of Foundation Project of Luoyang Department; the science and technology research project of education department of Henan Province (14A510009), the funding scheme for youth teacher of Henan Province (2012GGJS-191); China Postdoctoral Science Foundation under Grant (2014M562153), Projects (1201430560) supported by Guangzhou Education Bureau Science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeyu Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sun, Z., Wu, W., Xing, X., Li, C., Nie, Y., Cao, Y. (2015). A Hierarchical Shared Key Algorithm in Wireless Sensor Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics