Skip to main content

An Efficient Key Establishment Protocol for Wireless Sensor Networks

  • Conference paper
  • First Online:
Advances in Ubiquitous Networking (UNet 2015)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 366))

Included in the following conference series:

  • 1086 Accesses

Abstract

Wireless sensor network represents a new perspective for many applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However, due to limited resources of sensors and hostile environments in which they could be deployed, this type of networks is vulnerable to several types of attacks similar to those occurring in ad hoc networks. Therefore, it is necessary to use effective mechanisms to protect this type of network. Cryptography can play an important role in detecting and preventing security attacks. Our contribution is intended for applications using the WSN nodes with low mobility and require a high level of security. Unlike most methods in the literature for specific topologies, our security scheme can cover both the needs of flat and hierarchical topologies. In this paper, we proposed a new lightweight cryptography algorithm based on LEAP+. Simulations results of the proposed model are presented using TOSSIM simulator and the complexity of the protocol is analyzed and compared with other symmetric schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Huang, A.: Security Primitives for Ultra-Low Power Sensor Nodes in Wireless Sensor Networks, Faculty of Engineering, the Built Environment and Information Technology University of Pretoria (2005)

    Google Scholar 

  2. Gaubatz, G., Kaps, J., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited, Department of Electrical & Computer Engineering Worcester Polytechnic Institute, 100 Institute Road, Worcester, MA 01609, USA

    Google Scholar 

  3. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks 8(5), 521–534, September 2002

    Google Scholar 

  4. Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications 29(2), 216–230 (2006)

    Article  Google Scholar 

  5. Zhu, S., Setia, S., Jajodia, S.: LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500–528 (2006)

    Article  Google Scholar 

  6. Lim, C.H.: LEAP++: a robust key establishment scheme for wireless sensor networks. IEEE (2008). doi:10.1109/ICDCS.Workshops.2008.93

  7. Wen, H., Luo, J., Zhou, L.: Lightweight and effective detection scheme for node clone attack in wireless sensor networks. IET Wirel. Sens. Syst. 1(3), 137–143 (2011). doi:10.1049/iet-wss.2010

  8. Choi, H., Zhu, S., La Porta, T.F.: SET: detecting node clones in Sensor Networks, Department of Computer Science and Engineering, Pennsylvania State University

    Google Scholar 

  9. Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Sensor Networks, North Carolina State University

    Google Scholar 

  10. Wang, Y.-T., Bagrodia, R.: ComSen: a detection system for identifying compromised nodes in wireless sensor networks. In: SECURWARE 2012: The Sixth International Conference on Emerging Security Information, Systems and Technologies

    Google Scholar 

  11. Atakli, I.M., Hu, H., Chen, Y., Ku, W.-S., Su, Z.: Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Simulation of Systems Security (SSSS 2008), Ottawa, Canada, April 14–17, 2008

    Google Scholar 

  12. Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: accurate and scalable simulation of entire tinyos applications. In: SenSys 2003, Los Angeles, California, USA, November 5–7, 2003

    Google Scholar 

  13. Levis, P., Lee, N.: TOSSIM: a simulator for TinyOS networks, September 17, 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yassin Maleh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Maleh, Y., Ezzati, A. (2016). An Efficient Key Establishment Protocol for Wireless Sensor Networks. In: Sabir, E., Medromi, H., Sadik, M. (eds) Advances in Ubiquitous Networking. UNet 2015. Lecture Notes in Electrical Engineering, vol 366. Springer, Singapore. https://doi.org/10.1007/978-981-287-990-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-287-990-5_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-287-989-9

  • Online ISBN: 978-981-287-990-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics