Skip to main content

Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN

  • Conference paper
Advances in Security of Information and Communication Networks (SecNet 2013)

Abstract

It has been greatly acknowledged the emergence of the wireless sensor network (WSN) in many applications such as military, environmental and health applications. However, mobile agents have provided flexibility and customizability to overcome some of the WSN constraints such as limitation in power, computational capacities and memory through agent migration from node to node. Security is a crucial concern when it comes to mobile agents, due to threats from malicious hosts and other mobile agents, where the use of symmetric and asymmetric keys has been adopted to provide authentication and confidentiality. The use of asymmetric keys is nowadays feasible due to advances in WSN hardware. In this paper, Chord (A scalable peer to peer lookup service) is used for storing and looking up public keys in a clustered mobile agent WSN to protect sensor nodes from malicious agents. Cluster heads act as a distributed key storage and lookup facility forming a ring overlay network. Performance evaluation results through network simulation show that the proposed scheme provides efficiency and scalability in terms of key storage and lookup.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Henricksen, K., Robinson, R.: A survey of middleware for sensor networks: State-of-the-art and future directions. In: Proceedings of the International Workshop on Middleware for Sensor Networks, pp. 60–65 (2006)

    Google Scholar 

  2. Tong, S.: An evaluation framework for middleware approaches on wireless sensor networks.Technical report, Helsinki University of Technology (2009), http://cse.tkk.fi/en/publications/B/5/papers/tong_final.pdf

  3. Chen, M., Kwon, T., Yuan, Y., Leung, V.C.M.: Mobile Agent Based Wireless Sensor Networks. Journal of Computers 1(1), 14–21 (2006)

    Article  Google Scholar 

  4. Qi, H., Iyengar, S.S., Chakrabarty, K.: Multiresolution data integration using mobile agents in distributed sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 31(3), 383–391 (2001)

    Article  Google Scholar 

  5. Daniel, T.: Cogent computing: information extraction from large-scale wsns- a complex querying perspective. Technical report number COGENT.002, Coventry university (2008)

    Google Scholar 

  6. Fok, C.-L., Roman, G., Lu, C.: Mobile agent middleware for sensor networks: an application case study. In: Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, pp. 382–387 (2005)

    Google Scholar 

  7. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 17–32 (2003)

    Google Scholar 

  8. Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: Mobile Agent Middleware for Autonomic Data Fusion in Wireless Sensor Networks. In: Autonomic Computing and Networking, pp. 57–81 (2009)

    Google Scholar 

  9. Chen, M., Gonzalez, S., Leung, V.C.M.: Applications and design issues for mobile agents in wireless sensor networks. IEEE Trans. on Wireless Communications 14, 20–26 (2007)

    Google Scholar 

  10. Fok, C.-L.: A mobile agent middleware for wireless sensor networks (2008), http://mobilab.wustl.edu/projects/agilla/

  11. Baumann, J., Hohl, F., Radouniklis, N., Rothermel, K., Straβer, M.: Communication Concepts for Mobile Agent Systems. In: Rothermel, K., Popescu-Zeletin, R. (eds.) MA 1997. LNCS, vol. 1219, pp. 123–135. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  12. Vijil, E.C.: Security issues in mobile agents. Master’s thesis, Indian Institute of Technology, Bombay (2002), http://etd.aau.edu.et/dspace/bitstream/123456789/1552/1/Tinbit%20Admassu.pdf

  13. Sharma, S., Patheja, P.S., Waoo, A.A., Gour, R.: A survey on different security techniques of mobile code. International Journal of Engineering and Advanced Technology (IJEAT) 1(1) (2011)

    Google Scholar 

  14. Borselius, N.: Mobile agent security. IEEE Electronics and Communication Engineering Journal 14(5), 211–218 (2002)

    Article  Google Scholar 

  15. Wander, A.S., Gura, N., Eberle, H., Gupta, V.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, PerCom, pp. 324–328 (2005)

    Google Scholar 

  16. Baqer, M., Khan, A.I., Baig, Z.A.: Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC Workshops 2005. LNCS, vol. 3823, pp. 208–217. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Yu, J., Liu, W., Song, J.: C2WSN: A two-tier chord overlay serving for efficient queries in large-scale wireless sensor networks. In: International Conference on Advanced Computing and Communications, ADCOM 2007, pp. 237–242 (2007)

    Google Scholar 

  18. Ali, M., Uzmi, Z.A.: Csn: a network protocol for serving dynamic queries in large-scale wireless sensor networks. In: Second Annual Conference on Communication Networks and Services Research, May 19-21, pp. 165–174 (2004)

    Google Scholar 

  19. Zhang, F., Shi, Z.J., Wang, B.: Chord-based key establishment schemes for sensor networks. In: Fifth International Conference on Information Technology: New Generations, ITNG 2008, pp. 731–737 (2008)

    Google Scholar 

  20. Usman, M., Muthukkumarasamy, V., Wu, X.-W., Khanum, S.: Securing mobile agent based wireless sensor network applications on middleware. In: International Conference on Communications and Information Technologies (ISCIT), October 2-5, pp. 707–712 (2012)

    Google Scholar 

  21. Fok, C.-L., Roman, G.-C., Lu, C.: Agilla: A mobile agent middleware for self-adaptive wireless sensor networks. ACM Trans. Auton. Adapt. Syst. 4, 16:1–16:16 (2009)

    Google Scholar 

  22. Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, ISLPED 2003, August 25-27, pp. 30–35 (2003)

    Google Scholar 

  23. Jansma, N., Arrendondo, B.: Performance Comparison of Elliptic Curve and RSA Digital Signatures; Technical Report; University of Michigan, Ann Arbor, MI, USA (2004)

    Google Scholar 

  24. Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self-protected mobile agents. In: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, vol. (1), pp. 362–367 (2004)

    Google Scholar 

  25. Ismail, L.: A secure mobile agents platform. Journal of Communications 3(2) (2008)

    Google Scholar 

  26. Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 169–176 (2006)

    Google Scholar 

  27. Meulenaer, G., Gosset, F., Standaert, O.-X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2008, pp. 580–585 (2008)

    Google Scholar 

  28. Taylor, I.: AgentJ Java Network Simulations in NS-2. A Protean Research Group Project Naval Research Laboratory (2010), http://downloads.pf.itd.nrl.navy.mil/archive/agentj/agentj.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Amer, A., Abdel-Hamid, A., El-Nasr, M.A. (2013). Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds) Advances in Security of Information and Communication Networks. SecNet 2013. Communications in Computer and Information Science, vol 381. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40597-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40597-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40596-9

  • Online ISBN: 978-3-642-40597-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics