Abstract
It has been greatly acknowledged the emergence of the wireless sensor network (WSN) in many applications such as military, environmental and health applications. However, mobile agents have provided flexibility and customizability to overcome some of the WSN constraints such as limitation in power, computational capacities and memory through agent migration from node to node. Security is a crucial concern when it comes to mobile agents, due to threats from malicious hosts and other mobile agents, where the use of symmetric and asymmetric keys has been adopted to provide authentication and confidentiality. The use of asymmetric keys is nowadays feasible due to advances in WSN hardware. In this paper, Chord (A scalable peer to peer lookup service) is used for storing and looking up public keys in a clustered mobile agent WSN to protect sensor nodes from malicious agents. Cluster heads act as a distributed key storage and lookup facility forming a ring overlay network. Performance evaluation results through network simulation show that the proposed scheme provides efficiency and scalability in terms of key storage and lookup.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Henricksen, K., Robinson, R.: A survey of middleware for sensor networks: State-of-the-art and future directions. In: Proceedings of the International Workshop on Middleware for Sensor Networks, pp. 60–65 (2006)
Tong, S.: An evaluation framework for middleware approaches on wireless sensor networks.Technical report, Helsinki University of Technology (2009), http://cse.tkk.fi/en/publications/B/5/papers/tong_final.pdf
Chen, M., Kwon, T., Yuan, Y., Leung, V.C.M.: Mobile Agent Based Wireless Sensor Networks. Journal of Computers 1(1), 14–21 (2006)
Qi, H., Iyengar, S.S., Chakrabarty, K.: Multiresolution data integration using mobile agents in distributed sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 31(3), 383–391 (2001)
Daniel, T.: Cogent computing: information extraction from large-scale wsns- a complex querying perspective. Technical report number COGENT.002, Coventry university (2008)
Fok, C.-L., Roman, G., Lu, C.: Mobile agent middleware for sensor networks: an application case study. In: Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, pp. 382–387 (2005)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 17–32 (2003)
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: Mobile Agent Middleware for Autonomic Data Fusion in Wireless Sensor Networks. In: Autonomic Computing and Networking, pp. 57–81 (2009)
Chen, M., Gonzalez, S., Leung, V.C.M.: Applications and design issues for mobile agents in wireless sensor networks. IEEE Trans. on Wireless Communications 14, 20–26 (2007)
Fok, C.-L.: A mobile agent middleware for wireless sensor networks (2008), http://mobilab.wustl.edu/projects/agilla/
Baumann, J., Hohl, F., Radouniklis, N., Rothermel, K., Straβer, M.: Communication Concepts for Mobile Agent Systems. In: Rothermel, K., Popescu-Zeletin, R. (eds.) MA 1997. LNCS, vol. 1219, pp. 123–135. Springer, Heidelberg (1997)
Vijil, E.C.: Security issues in mobile agents. Master’s thesis, Indian Institute of Technology, Bombay (2002), http://etd.aau.edu.et/dspace/bitstream/123456789/1552/1/Tinbit%20Admassu.pdf
Sharma, S., Patheja, P.S., Waoo, A.A., Gour, R.: A survey on different security techniques of mobile code. International Journal of Engineering and Advanced Technology (IJEAT)Â 1(1) (2011)
Borselius, N.: Mobile agent security. IEEE Electronics and Communication Engineering Journal 14(5), 211–218 (2002)
Wander, A.S., Gura, N., Eberle, H., Gupta, V.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, PerCom, pp. 324–328 (2005)
Baqer, M., Khan, A.I., Baig, Z.A.: Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC Workshops 2005. LNCS, vol. 3823, pp. 208–217. Springer, Heidelberg (2005)
Yu, J., Liu, W., Song, J.: C2WSN: A two-tier chord overlay serving for efficient queries in large-scale wireless sensor networks. In: International Conference on Advanced Computing and Communications, ADCOM 2007, pp. 237–242 (2007)
Ali, M., Uzmi, Z.A.: Csn: a network protocol for serving dynamic queries in large-scale wireless sensor networks. In: Second Annual Conference on Communication Networks and Services Research, May 19-21, pp. 165–174 (2004)
Zhang, F., Shi, Z.J., Wang, B.: Chord-based key establishment schemes for sensor networks. In: Fifth International Conference on Information Technology: New Generations, ITNG 2008, pp. 731–737 (2008)
Usman, M., Muthukkumarasamy, V., Wu, X.-W., Khanum, S.: Securing mobile agent based wireless sensor network applications on middleware. In: International Conference on Communications and Information Technologies (ISCIT), October 2-5, pp. 707–712 (2012)
Fok, C.-L., Roman, G.-C., Lu, C.: Agilla: A mobile agent middleware for self-adaptive wireless sensor networks. ACM Trans. Auton. Adapt. Syst. 4, 16:1–16:16 (2009)
Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, ISLPED 2003, August 25-27, pp. 30–35 (2003)
Jansma, N., Arrendondo, B.: Performance Comparison of Elliptic Curve and RSA Digital Signatures; Technical Report; University of Michigan, Ann Arbor, MI, USA (2004)
Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self-protected mobile agents. In: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, vol. (1), pp. 362–367 (2004)
Ismail, L.: A secure mobile agents platform. Journal of Communications 3(2) (2008)
Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 169–176 (2006)
Meulenaer, G., Gosset, F., Standaert, O.-X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2008, pp. 580–585 (2008)
Taylor, I.: AgentJ Java Network Simulations in NS-2. A Protean Research Group Project Naval Research Laboratory (2010), http://downloads.pf.itd.nrl.navy.mil/archive/agentj/agentj.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Amer, A., Abdel-Hamid, A., El-Nasr, M.A. (2013). Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds) Advances in Security of Information and Communication Networks. SecNet 2013. Communications in Computer and Information Science, vol 381. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40597-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-40597-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40596-9
Online ISBN: 978-3-642-40597-6
eBook Packages: Computer ScienceComputer Science (R0)