Skip to main content
Log in

A real-time dynamic key management for hierarchical wireless multimedia sensor network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the recent fast growth in the electronics industry and potential customers, communication managements in interactive Wireless Multimedia Sensor Networks (WMSNs) are increasingly ubiquitous, such as retrieving images, audio streams, video streams, and scalar sensor data, etc. However, due to restricted resources and operation in a hostile environment, WMSNs are usually subjected to numerous threats and vulnerable to various attacks. In this paper, we present a Real-time Dynamic Key Management (RDKM), a splay tree-based rekey management, which can efficiently enhance the network security and survivability in the LEACH-like protocol. Compared to other LEACH-like security solutions, our work offers some salient advantages. First, it establishes a real-time rekey mechanism based on the access-triggered splay tree architecture. In the mechanism, the keys will be changed during messages exchanging phase. To the best of our knowledge, RDKM is the first real-time key management for security in WMSNs. Second, it designs and realizes the rekey mechanism based on the splay tree, which can provide dynamic architecture to generate new keys and make the dynamic key management feasible without any overhead. The novel mechanism can efficiently protect the network against attacks from eavesdropping or captured nodes compromise and address challenging security issues of runtime in WMSNs. Experimental analysis shows that our solution has high security levels as well as good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Akyildiz I, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 5(1):921–960

    Article  Google Scholar 

  2. Bandyopadhyay S, Coyle EJ. “An energy efficient hierarchical clustering algo-rithm for wireless sensor networks”, in Proceeding of IEEE INFOCOM’03, San Francisco, April 2003

  3. Chan H, Perrig A, Song D. “Random key predistribution schemes for sensor networks”. Proc IEEE Symp Security and Privacy, May 2003

  4. Chang RS, Kuo CJ (2006) “An energy-efficient routing mechanism for wireless sensor networks”. Adv Inf Netw Appl (AINA’06) IEEE, 2: 18–20 April 2006 Page(s):5 pp

  5. Chen M, González S, Cao H, Zhang Y, Vuong S. “Enabling low bit-rate and reliable video surveillance over practical wireless sensor networks”. J Supercomput, September 2010

  6. Chen JS, Hong ZW, Wang NC, Jhuang SH. “Efficient cluster head selection methods for wireless sensor networks”. J Netw 5(8), August 2010

  7. Chen M, Kwon T, Mao S, Yuan Y, Leung V (2008) Reliable and energy-efficient routing protocol in dense wireless sensor networks. Int J Sens Netw (IJSNet) 4(1/2):104–117

    Article  Google Scholar 

  8. Chen M, Lai C, Wang H (2011) “Mobile multimedia sensor networks: architecture and routing”. EURASIP J Wirel Commun Netw 2011, doi:10.1186/1687-1499-2011-159

  9. Chen M, Leung V, Mao S (2009) Directional controlled fusion in wireless sensor networks. ACM/Springer Mob Netw Appl (MONET) 14(2):220–229

    Article  Google Scholar 

  10. Chen M, Leung V, Mao S, Xiao Y, Chlamtac I (2009) Hybrid geographical routing for flexible energy-delay trade-offs. IEEE Trans Veh Technol 58(9):4976–4988

    Article  Google Scholar 

  11. Chen M, Leung V, Mao S, Yuan Y (2007) Directional geographical routing for real-time video communications in wireless sensor networks. Elsevier Comput Commun 30(17):3368–3383

    Article  Google Scholar 

  12. Chen M, Yang L, Kwon T, Zhou L, Jo M (2011) Itinerary planning for energy-efficient agent communication in wireless sensor networks. IEEE Trans Veh Technol 60(7):3290–3299

    Article  Google Scholar 

  13. Chen M et al (2011) Body area networks: a survey. ACM/Springer Mob Netw Appl 16(2):171–193

    Article  Google Scholar 

  14. Deng J, Hartung C, Han R, Mishra S (2005) “A practical study of transitory master key establishment for wireless sensor networks”, In 1st IEEE/CreateNet Conference on Security and Privacy in Communication Networks, p289–299

  15. Eltoweissy M, Moharrum M, Mukkamala R (2006) Dynamic key management in sensor networks. IEEE Commun Mag 44(4):122–130

    Article  Google Scholar 

  16. Fanrui K, Chunwen L (2010) Dynamic key management scheme for wireless sensor network. J Softw 21(7):1679–1691, in Chinese

    Google Scholar 

  17. Grieco LA, Boggia G, Sicari S, Colombo P (2009) “Secure wireless multimedia sensor networks: a survey”, ubicomm, pp.194–201, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

  18. http://en.wikipedia.org/wiki/Message_authentication_code

  19. http://en.wikipedia.org/wiki/Splay_tree

  20. Jiang YX, Lin C, Shi MH, Shen XM (2006) Security in sensor networks. Taylor and Francis Group, Oxfordshire, pp 113–143

    Book  Google Scholar 

  21. Jolly G, Kusçu MC, Kokate P, Younis MF. “A low-energy key management protocol for wireless sensor networks”. Proc IEEE Symp Comp Commun: 335, June 2003

  22. Lai R, Chen M. “Mobile multimedia technology for internet of things”. IEEE MMTC Lett 6(9), September 2011

  23. Luk M, Mezzour G, Perrig A, Gligor V. “MiniSec: a secure sensor network communication architecture”, In Proceedings of the Sixth International Conference on Information Processing in Sensor Networks (IPSN 2007), April 2007

  24. Manjeshwar A, Grawal DP (2001) “TEEN: a protocol for enhanced effciency in wireless sensor networks”, the 15th Paralleland Distributed Processing Symp. San Francisco: IEEE Computer Society, 2009–2015

  25. Oliveira LB, Hao C, Wong, Bern M (2006) SecLEACH: a random key distribution solution for securing clustered sensor networks. Fifth IEEE Interna-tional Symposium on Network Computing and Applications

  26. Shu L, Chen M. “Multimedia over sensor networks”. IEEE COMSOC MMTC E-Letter, Sep 2010

  27. Tang W, Chen M, Ni J, Yang X (2011) Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems. Sensors 11(7):6743–6759

    Article  Google Scholar 

  28. Xiong NN, Vasilakos A, Yang LT, Song L, Pan Y, Kannan R, Li Y (2009) Comparative analysis of QoS and memory usage of adaptive failure detectors. IEEE J Sel Areas Commun Spec Issue Wirel Pervasive Commun Healthc 27(4):495–509

    Article  Google Scholar 

  29. Yu Z, Guan Y. “A key management scheme using deployment knowledge for wireless sensor networks”. IEEE Trans Parallel Distrib Syst Arch 19(10), October 2008

  30. Zhang YC, Liu W, Lou WJ, Fang YG (2006) Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J Sel Areas Commun 24(2):247–260

    Article  Google Scholar 

  31. Zhang YY, Park MS, Chao HC, Chen M, SHU L, Park CH. “Outlier detection and countermeasure for hierarchical wireless sensor networks”. IET Inf Secur:361–373, December 2010

  32. Zhang YY, Yang WC, HE L, SHU L. “A hierarchy-based dynamic key management for clustered wireless sensor network”, The 2011 International Conference on Energy Systems and Electrical Power (ESEP 2011)

  33. Zhang YY, Yang WC, Kim KB, Park MS (2008) “An AVL tree-based dynamic key management in hierarchical wireless sensor network”, iih-msp, pp. 298–303, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing

  34. Zhu S, Setia S, Jajodia S. “LEAP+: efficient security mechanisms for large-scale distributed sensor networks”. ACM Trans Sens Netw (TOSN) 2(4), November 2006

Download references

Acknowledgements

This research work was supported by Doctoral Start-up Fund of Liaoling Province (20101074), Liaoning, China. This work was also supported by the foundation: Important National Science & Technology Specific Projects of China: Research, development, and application validation of sensor network for smart grid security monitoring, transmission efficiency, measurement and user interaction (2010ZX03006-005-02); the National Basic Research Program of China (973 Program): Basic theory and practice research of Internet of Things (2011CB302900).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiying Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Y., Li, X., Yang, J. et al. A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimed Tools Appl 67, 97–117 (2013). https://doi.org/10.1007/s11042-012-1054-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1054-8

Keywords

Navigation