Skip to main content

Advertisement

Log in

Secure and Energy-Efficient Traffic-Aware Key Management Scheme for Wireless Sensor Network

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

In Wireless Sensor Network (WSN), a sensor node may communicate with a small set of neighbor sensor nodes. Existing key management schemes, did not consider this communication between these nodes. They establish shared keys for all pairs of neighbor sensor nodes. When the number of sensor nodes in WSN is augmented, large number of keys is to be loaded in each sensor node, which in turn causes supplementary energy consumption. If any two close sensor nodes are seldom in the active-state the assignment of shared keys may be gratuitous, since they may be hardly exploited.In this paper, based on this information, secure and Energy-Efficient Traffic Aware key Management (EETKM) is developed for WSN. This determines shared keys for active sensors which takes part in the direct communication. In order to broadcast keys without retransmission or acknowledgements, the proposed scheme gives an efficient Re-keying mechanism. The proposed scheme attains high connectivity which is shown through numerical results. The proposed scheme is applied for various routing protocols and the simulation results shows the stronger resilience, low energy consumption and increased delivery ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer. Secure routing protocol for ad hoc networks. In Proceedings of the IEEE International Conference on Network Protocols, 2002.

  2. Y. Hu, A. Perrig, and D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the International Conference on Mobile Computing and Networking (MobiCom), 2002.

  3. A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA broadcast authentication protocol. RSA CryptoBytes, Vol. 5, No. 2, pp. 2–13, 2002.

  4. J. Park, Z. Kim, and K. Kim, State-based key management scheme for wireless sensor networks. IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 7–10 Nov. 2005.

  5. W. Du, J. Deng, Y.S. Han, S. Chen, P. K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge. INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies 7–11 March 2004.

  6. A. Price, K. Kosaka and S. Chatterjee, A secure key management scheme for sensor networks. Proceedings of the Tenth Americas Conference on Information Systems, New York, New York, August 2004.

  7. S.-P. Chan, R. Poovendran and M.-T. Sun, A key management scheme in distributed sensor networks using attack probabilities. Global Telecommunications Conference, 2005. GLOBECOM ‘05. 28 Nov.–2 Dec. 2005.

  8. R. Miguel Soares Silva, N. Sidónio Andrade Pereira and M. Serafim Nunes, Chaos based key management architecture for wireless sensor networks, Australian Telecommunication Networks and Application Conference [ATNAC 2006], December 4–6, 2006.

  9. D. Huang, M. Mehta, D. Medhi and L. Harn, Location aware key management scheme for wireless sensor networks. Proceedings of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04), pp. 29–42, October 2004.

  10. F. An, X. Cheng, J. M. Rivera, J. Li, and Z. Cheng, PKM: a pairwise key management scheme for wireless sensor networks. Lecture Notes in Computer Science 2005, Numb 3619, pp. 992–1001.

  11. A. Mohaisen, D.H. Nyang, and K. Hee Lee (2008) Hierarchical grid-based pairwise key pre-distribution in wirelesssensor networks. International Journal On Network and Security, March 2008.

  12. N. Suganthi and V. Dr. Sumathy, An efficient key management scheme for mobile ad hoc networks with authentication. International Journal of Computer and Network Security, Vol. 2, No. 5, May 2010, pp no. 103–107.

  13. Charles E. Perkins, Elizabeth M. Royer “Ad hoc On Demand Distance Vector Routing” Second IEEE Workshop on Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA ‘99. Publication Date: 25-26 Feb 1999.

  14. C.E. Perkins and P.Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the SIGCOMM’94 conference on Communications, Architectures, Protocols, and Applications, August 1994.

  15. D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks. Wiley Series on Parallel and Distributed Computing, pp. 425–450, Year of publication: 2002 ISBN:0-471-41902-8.

  16. C. Karlof and D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures. Proceedings of the First IEEE International Workshop on In Sensor Network Protocols and Applications, 2003.

  17. P. Tague, M. Li and R. Poovendran, Mitigation of control channel jamming under node capture attacks, IEEE Transactions on Mobile Computing, Vol. 8, No. 9, pp. 1221–1234, 2009.

    Article  Google Scholar 

  18. P. Tague, D. Slater, J. Rogers, and R. Poovendran, Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. Proceeding of The 27th Conference on Computer Communications. IEEE INFOCOM, pp. 161–165, 13–18 April 2008.

  19. M. F. Younis, K. Ghumman, and M. Eltoweissy, Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 8, August 2006.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Gnana Kousalya.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Gnana Kousalya, C., Anandha Mala, G.S. Secure and Energy-Efficient Traffic-Aware Key Management Scheme for Wireless Sensor Network. Int J Wireless Inf Networks 19, 112–121 (2012). https://doi.org/10.1007/s10776-011-0169-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-011-0169-6

Keywords

Navigation