Abstract
In this paper we focus on key management scheme for a specific WSN application such as Advanced Metering Infrastructure (AMI), which is based on hierarchical tree network and performs metering data aggregation along the tree. We utilize a novel identity based key generation and propose a hierarchical key management algorithm based on encapsulated encryption. Through experiments, we prove that the proposed key management scheme is suitable for small embedded networked systems which have energy, memory, and processing constraints.
Keywords
K.-i. Hwang––This work was supported by the Industrial Core Technology Development Program (10049009, Development of Main IPs for IoT and Image-Based Security Low-Power SoC) funded by the Ministry of Trade, Industry & Energy, and also supported by a grant (12-TI-C01) from Advanced Water Management Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Vamsi, P.R., Kant, K.: A taxonomy of key management schemes of wireless sensor networks. In: 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT), vol. 690(696), pp. 21–22 (2015)
Bala, S., Sharma, G., Verma, A.K.: Classification of Symmetric Key Management Schemes for Wireless Sensor Network. International Journal of Security and Its Applications 7(2), March 2013
Lee, J., Stinson, D.R.: Deterministic key pre-distribution schemes for distributed sensor networks. In: ACM Symposium on Applied Computing 2004, Waterloo, Canada. Lecture Notes in Computer Science, vol. 3357, pp. 294–307 (2004)
Blom, R.: Theory and application of cryptographic techniques. In: Proceedings of the Eurocrypt 84 Workshop on Advances in Cryptology, pp. 335–338. Springer, Berlin (1984)
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)
Jang, J., Kwon, T., Song, J.: A time-based key management protocol for wireless sensor networks. In: Proceedings of ISPEC. LNCS, vol. 4464, pp. 314–328 (2007)
Liu, D.G., Ning, P., Li, R.F.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)
Delgosha, F., Fekri, F.: A Multivariate Key-Establishment Scheme for Wireless Sensor Networks. IEEE Transactions on wireless communications 8(4) (2009)
Das, A.: Improving Identity-based Random Key Establishment Scheme for Large-scale Hierarchical Wireless Sensor Networks. International Journal of Network Security 14(1), 1–21 (2012)
Liu, D., Ning, P.: Improving Key Pre-Distribution with Deployment Knowledge In Static Sensor Networks. ACM Transactions on Sensor Networks 1(2), 204–239 (2005)
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 1(8), 41–77 (2005)
Liu, D., Ning, P.: Location-based pair-wise key establishment for static sensor networks. In: Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (2003)
Liu, D., Ning, P.: Establishing pair-wise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security CCS 2003 (2003)
Zhang, W., Tran, M., Zhu, S., Cao, G.: A random perturbation-based scheme for pairwise key establishment in sensor networks. In: Proceedings of MOBIHOC 2007, Montréal, Québec, Canada (2007)
Eschenauer, L., Gligor, V.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security, CCS 2002, pp 41–47 (2002)
Bloom, R.: An optimal class of symmetric key generation systems. In: Proceedings of EUROCRYPT 84, pp 335–338 (1985)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kim, MS., Park, SK., Kim, HS., Hwang, Ki. (2015). An Efficient Key Management Scheme for Advanced Metering Infrastructure. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_18
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)