Skip to main content

Multihop-Based Key Management in Hierarchical Wireless Sensor Network

  • Conference paper
Advances in Grid and Pervasive Computing (GPC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7296))

Included in the following conference series:

Abstract

The vulnerable environment and open communication channel make it very necessary to protect wireless sensor networks (WSNs). The key management is the most important way to protect the communication in WSNs. In this paper, we design a Multihop-based Key Management (MKM) which can efficiently enhance the security and survivability in the hierarchical WSNs. Different from previous works, we present the key system as well as the cluster formation. The MKM generates and distributes keys based on hop counts, which not only localizes the key things but also has no overhead. The MKM provides the session keys among sensors and the cluster key between the cluster head and its member nodes. The different hops make the different keys. The MKM can protect the network from the compromised nodes by reducing the high probability of the common keys. The security analysis can effectively prevent several attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, Y.: Securing Wireless sensor networks: A Survey. IEEE Communications Surveys & Tutorials (3rd Quarter, 2008)

    Google Scholar 

  2. Banihashemian, S., Ghaemi Bafghi, A.: A new key management scheme in heterogeneous wireless sensor networks. In: Proceeding ICACT 2010, Korea (2010)

    Google Scholar 

  3. Anjum, F.: Location dependent key management in sensor networks using without using deployment knowledge. In: Proceedings of WiSe 2006 (2006)

    Google Scholar 

  4. Du, X., Xiao, Y., Guizani, M., Chen, H.-H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks 5(1), 24–34 (2007)

    Article  Google Scholar 

  5. Banihashemian, S., Bafghi, A.G.: Alternative shared key replacement in heterogeneous wireless sensor networks. In: Proceeding IEEE Computer Society (2010)

    Google Scholar 

  6. Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: A Secure Sensor Network Communication Architecture. In: IPSN 2007 (April 2007)

    Google Scholar 

  7. Zhu, S., Setia, S., Jaodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Transactions on Sensor Networks 2(4), 500–528 (2006)

    Article  Google Scholar 

  8. Abbasi, A.A., Younis, M.: A survey on clustering algorithms for wireless sensor networks. Computer Communications 30, 2826–2841 (2007)

    Article  Google Scholar 

  9. Bandyopadhyay, S., Coyle, E.J.: An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks. In: Proceeding of IEEE INFOCOM 2003, San Francisco (April 2003)

    Google Scholar 

  10. Handy, M.J., Haase, M., Timmermann, D.: Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: Mobile and Wireless Communications Networks, pp. 368–372. IEEE Communications Society, Stockholm (2002)

    Google Scholar 

  11. Manjeshwar, A., Grawal, D.P.: TEEN: A protocol for enhanced effciency in wireless sensor networks. In: PDPS 2001, pp. 2009–2015. IEEE Computer Society, San Francisco (2001)

    Google Scholar 

  12. Abdalla, M., Bellare, M.: Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 546–559. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004: Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 1. IEEE (2004)

    Google Scholar 

  14. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of Symposium on Security and Privacy, pp. 197–213. IEEE (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y., Li, X., Zhen, Y., Zeng, L. (2012). Multihop-Based Key Management in Hierarchical Wireless Sensor Network. In: Li, R., Cao, J., Bourgeois, J. (eds) Advances in Grid and Pervasive Computing. GPC 2012. Lecture Notes in Computer Science, vol 7296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30767-6_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30767-6_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30766-9

  • Online ISBN: 978-3-642-30767-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics