Abstract
A sensor network operating in open environments requires a network-wide group key for confidentiality of exchanged messages between sensor nodes. When a node behaves abnormally due to its malfunction or a compromise attack by adversaries, the central sink node should update the group key of other nodes. The major concern of this group key update procedure will be the multi-hop communication overheads of the rekeying messages due to the energy constraints of sensor nodes. Many researchers have tried to reduce the number of rekeying messages by using the logical key tree. In this paper, we propose an energy-efficient group key management scheme called Topological Key Hierarchy (TKH). TKH generates a key tree by using the underlying sensor network topology with consideration of subtree-based key tree separation and wireless multicast advantage. Based on our detailed analysis and simulation study, we compare the total rekeying costs of our scheme with the previous logical key tree schemes and demonstrate its energy efficiency.
Similar content being viewed by others
References
Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E. (2002) A survey on sensor networks. IEEE Communications Magazine 40(8): 102–114
Wallner, D. M., Harder, E. J., & Agee, R. C. (1997). Key management for multicast: Issues and Architectures. IETF RFC 2627, July, 1997.
Wong, C. K., Gouda, M. G., & Lam, S. S. (1998). Secure group communications using key graphs. ACM SIGCOMM, 1998.
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., & Pinkas, B. (1999). Multicast security: A taxonomy and some efficient constructions. IEEE INFOCOM, 1999.
Sherman A.T., McGrew D.A. (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering 29(5): 444–458
Lin, J.-C., Lai, F., & Lee, H.-C. (2005). Efficient group key management protocol with one-way key derivation. IEEE Conference on Local Computer Networks (LCN), 2005.
Lazos, L., & Poovendran, R. (2003). Energy-aware secure multicast communication in ad-hoc networks using geographic location information. IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP), 2003.
Sun Y., Trappe W., Liu K.J.R. (2004) A scalable multicast key management scheme for heterogeneous wireless networks. IEEE/ACM Transactions on Networking 12(4): 653–666
Wang C., Xiao L. (2007) Sensor localization under limited measurement capabilities. IEEE Network 21(3): 16–23
Kim, K., Perrig, A., & Tsudik, G. (2000). Simple and fault-tolerant key agreement for dynamic collaborative groups. In 7th ACM Conference on Computer and Communications Security (CCS), 2000.
Waldvogel M., Caronni G., Sun D., Weiler N., Plattner B. (1999) The versaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications 17(9): 1614–1631
Horng G. (2002) Cryptanalysis of a key management scheme for secure multicast communications. IEICE: IEICE Transactions on Communications/Electronics/Information and Systems E85-B(5): 1050–1051
Ku, W.-C., & Chen, S.-M. (2003). An improved key management scheme for large dynamic groups using one-way function trees. International Conference on Parallel Processing Workshops, 2003.
Rafaeli S., Hutchison D. (2003) A survey of key management for secure group communication. ACM Computing Surveys 35(3): 303–329
ZigBee Alliance (2006). ZigBee Specifications (version 1.0, r13) 1 December, 2006.
Diot C., Dabbous W., Crowcroft J. (1997) Multipoint communication: A survey of protocols, functions, and mechanisms. IEEE Journal on Selected Areas in Communications 15(3): 277–290
Wieselthier J.E., Nguyen G.D., Ephremides A. (2002) Energy-efficient broadcast and multicast trees in wireless networks. Mobile Networks and Applications 7(6): 481–492
Li, X., Yang, Y. R., Gouda, M. G., & Lam, S. S. (2001). Batch rekeying for secure group communications. WWW10, 2001.
Tucker, A. (1995). Applied combinatorics. Wiley.
Texas Instruments Inc. (2007). Single-Chip 2.4 GHz IEEE 802.15.4 Compliant and ZigBee(TM) Ready RF Transceiver. Available at: http://www-s.ti.com/sc/ds/cc2420.pdf.
Penrose M.D. (2003) Random geometric graphs oxford studies in probability. Oxford University Press, Oxford
Penrose M.D. (1997) The longest edge of the random minimal spanning tree. The Annals of Applied Probability 7(2): 340–361
Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2001). Introduction to algorithms. The MIT Press.
Park J., Sahni S. (2005) Maximum lifetime broadcasting in wireless networks. IEEE Transactions on Computers 54(9): 1081–1090
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Son, JH., Lee, JS. & Seo, SW. Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks. Wireless Pers Commun 52, 359–382 (2010). https://doi.org/10.1007/s11277-008-9653-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-008-9653-4