Skip to main content

Advertisement

Log in

Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A sensor network operating in open environments requires a network-wide group key for confidentiality of exchanged messages between sensor nodes. When a node behaves abnormally due to its malfunction or a compromise attack by adversaries, the central sink node should update the group key of other nodes. The major concern of this group key update procedure will be the multi-hop communication overheads of the rekeying messages due to the energy constraints of sensor nodes. Many researchers have tried to reduce the number of rekeying messages by using the logical key tree. In this paper, we propose an energy-efficient group key management scheme called Topological Key Hierarchy (TKH). TKH generates a key tree by using the underlying sensor network topology with consideration of subtree-based key tree separation and wireless multicast advantage. Based on our detailed analysis and simulation study, we compare the total rekeying costs of our scheme with the previous logical key tree schemes and demonstrate its energy efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E. (2002) A survey on sensor networks. IEEE Communications Magazine 40(8): 102–114

    Article  Google Scholar 

  2. Wallner, D. M., Harder, E. J., & Agee, R. C. (1997). Key management for multicast: Issues and Architectures. IETF RFC 2627, July, 1997.

  3. Wong, C. K., Gouda, M. G., & Lam, S. S. (1998). Secure group communications using key graphs. ACM SIGCOMM, 1998.

  4. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., & Pinkas, B. (1999). Multicast security: A taxonomy and some efficient constructions. IEEE INFOCOM, 1999.

  5. Sherman A.T., McGrew D.A. (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering 29(5): 444–458

    Article  Google Scholar 

  6. Lin, J.-C., Lai, F., & Lee, H.-C. (2005). Efficient group key management protocol with one-way key derivation. IEEE Conference on Local Computer Networks (LCN), 2005.

  7. Lazos, L., & Poovendran, R. (2003). Energy-aware secure multicast communication in ad-hoc networks using geographic location information. IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP), 2003.

  8. Sun Y., Trappe W., Liu K.J.R. (2004) A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Transactions on Networking 12(4): 653–666

    Article  Google Scholar 

  9. Wang C., Xiao L. (2007) Sensor localization under limited measurement capabilities. IEEE Network 21(3): 16–23

    Article  Google Scholar 

  10. Kim, K., Perrig, A., & Tsudik, G. (2000). Simple and fault-tolerant key agreement for dynamic collaborative groups. In 7th ACM Conference on Computer and Communications Security (CCS), 2000.

  11. Waldvogel M., Caronni G., Sun D., Weiler N., Plattner B. (1999) The versaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications 17(9): 1614–1631

    Article  Google Scholar 

  12. Horng G. (2002) Cryptanalysis of a key management scheme for secure multicast communications. IEICE: IEICE Transactions on Communications/Electronics/Information and Systems E85-B(5): 1050–1051

    Google Scholar 

  13. Ku, W.-C., & Chen, S.-M. (2003). An improved key management scheme for large dynamic groups using one-way function trees. International Conference on Parallel Processing Workshops, 2003.

  14. Rafaeli S., Hutchison D. (2003) A survey of key management for secure group communication. ACM Computing Surveys 35(3): 303–329

    Article  Google Scholar 

  15. ZigBee Alliance (2006). ZigBee Specifications (version 1.0, r13) 1 December, 2006.

  16. Diot C., Dabbous W., Crowcroft J. (1997) Multipoint communication: A survey of protocols, functions, and mechanisms. IEEE Journal on Selected Areas in Communications 15(3): 277–290

    Article  Google Scholar 

  17. Wieselthier J.E., Nguyen G.D., Ephremides A. (2002) Energy-efficient broadcast and multicast trees in wireless networks. Mobile Networks and Applications 7(6): 481–492

    Article  MathSciNet  Google Scholar 

  18. Li, X., Yang, Y. R., Gouda, M. G., & Lam, S. S. (2001). Batch rekeying for secure group communications. WWW10, 2001.

  19. Tucker, A. (1995). Applied combinatorics. Wiley.

  20. Texas Instruments Inc. (2007). Single-Chip 2.4 GHz IEEE 802.15.4 Compliant and ZigBee(TM) Ready RF Transceiver. Available at: http://www-s.ti.com/sc/ds/cc2420.pdf.

  21. Penrose M.D. (2003) Random geometric graphs oxford studies in probability. Oxford University Press, Oxford

    Book  Google Scholar 

  22. Penrose M.D. (1997) The longest edge of the random minimal spanning tree. The Annals of Applied Probability 7(2): 340–361

    Article  MATH  MathSciNet  Google Scholar 

  23. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2001). Introduction to algorithms. The MIT Press.

  24. Park J., Sahni S. (2005) Maximum lifetime broadcasting in wireless networks. IEEE Transactions on Computers 54(9): 1081–1090

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ju-Hyung Son.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Son, JH., Lee, JS. & Seo, SW. Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks. Wireless Pers Commun 52, 359–382 (2010). https://doi.org/10.1007/s11277-008-9653-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-008-9653-4

Keywords

Navigation