Abstract
Wireless sensor network represents a new perspective for many applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However, due to limited resources of sensors and hostile environments in which they could be deployed, this type of networks is vulnerable to several types of attacks similar to those occurring in ad hoc networks. Therefore, it is necessary to use effective mechanisms to protect this type of network. Cryptography can play an important role in detecting and preventing security attacks. Our contribution is intended for applications using the WSN nodes with low mobility and require a high level of security. Unlike most methods in the literature for specific topologies, our security scheme can cover both the needs of flat and hierarchical topologies. In this paper, we proposed a new lightweight cryptography algorithm based on LEAP+. Simulations results of the proposed model are presented using TOSSIM simulator and the complexity of the protocol is analyzed and compared with other symmetric schemes.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Huang, A.: Security Primitives for Ultra-Low Power Sensor Nodes in Wireless Sensor Networks, Faculty of Engineering, the Built Environment and Information Technology University of Pretoria (2005)
Gaubatz, G., Kaps, J., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited, Department of Electrical & Computer Engineering Worcester Polytechnic Institute, 100 Institute Road, Worcester, MA 01609, USA
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks 8(5), 521–534, September 2002
Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications 29(2), 216–230 (2006)
Zhu, S., Setia, S., Jajodia, S.: LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500–528 (2006)
Lim, C.H.: LEAP++: a robust key establishment scheme for wireless sensor networks. IEEE (2008). doi:10.1109/ICDCS.Workshops.2008.93
Wen, H., Luo, J., Zhou, L.: Lightweight and effective detection scheme for node clone attack in wireless sensor networks. IET Wirel. Sens. Syst. 1(3), 137–143 (2011). doi:10.1049/iet-wss.2010
Choi, H., Zhu, S., La Porta, T.F.: SET: detecting node clones in Sensor Networks, Department of Computer Science and Engineering, Pennsylvania State University
Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Sensor Networks, North Carolina State University
Wang, Y.-T., Bagrodia, R.: ComSen: a detection system for identifying compromised nodes in wireless sensor networks. In: SECURWARE 2012: The Sixth International Conference on Emerging Security Information, Systems and Technologies
Atakli, I.M., Hu, H., Chen, Y., Ku, W.-S., Su, Z.: Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Simulation of Systems Security (SSSS 2008), Ottawa, Canada, April 14–17, 2008
Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: accurate and scalable simulation of entire tinyos applications. In: SenSys 2003, Los Angeles, California, USA, November 5–7, 2003
Levis, P., Lee, N.: TOSSIM: a simulator for TinyOS networks, September 17, 2003
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Maleh, Y., Ezzati, A. (2016). An Efficient Key Establishment Protocol for Wireless Sensor Networks. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_27
Download citation
DOI: https://doi.org/10.1007/978-981-287-990-5_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-287-989-9
Online ISBN: 978-981-287-990-5
eBook Packages: EngineeringEngineering (R0)