Computer Science ›› 2016, Vol. 43 ›› Issue (7): 153-156.doi: 10.11896/j.issn.1002-137X.2016.07.027

Previous Articles     Next Articles

Secure and Efficient Hybrid Key Management Mechanism in Heterogeneous WSN

WANG Gang, SUN Liang-xu, ZENG Zi-wei and YANG Dan   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Key management is crucially important for all security goals in WSNs.For solving the security vulnerabilities and heavy overhead problems of the existing key managements in heterogeneous WSN,a key management mechanism was put forward.The mechanism includes an ECC-based lightweight sigcryption algorithm which can not only cost less computation and communication,but also have better forward security.An entire cluster key management protocol is designed based on the above sigcryption that can ensure the communication security in the cluster and use cluster base key to generate the cluster key in each cluster.The employment of cluster base key can effectively avoid all SNs being invalid when CH is captured.To adapt the dynamic and scalability characteristic of WSN,the cluster key can be effectively refreshed and maintained by utilizing the cluster key refresh chain.In addition,a cluster key security management model was proposed which can self-adaptively refresh the cluster key according to the change of network environment thread and further improve the cluster key refreshment performance.The contrast results show that the presented mechanism is better than other existing mechanisms in terms of security and protocol performance.

Key words: Key management,Heterogeneous WSN,Elliptical curve cryptography,Signcryption,Cluster key

[1] Zeng Wei-ni,Lin Ya-ping,Yu Jian-ping,et al.Group Key Ma-nagement Based on Random Perturbation in Wireless Sensor Networks[J].Journal of Software,2013,24(4):873-886(in Chinese) 曾玮妮,林亚平,余建平,等.传感器网络中基于随机混淆的组密钥管理机制[J].软件学报,2013,24(4):873-886
[2] Guo Song-hui,Niu Xiao-peng,Wang Yu-long.Elliptic CurveBased Light-weight Authentication and Key Agreement Scheme [J].Computer Science,2015,42(1):137-141(in Chinese) 郭松辉,牛小鹏,王玉龙.一种基于椭圆曲线的轻量级身份认证及密钥协商方案[J].计算机科学,2015,42(1):137-141
[3] Wang Gang,Wen Tao,Guo Quan,et al.An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks [J].Journal of Computer Research and Development,2010,47(5):911-920(in Chinese) 王刚,温涛,郭权,等.移动自组网中安全高效的组密钥管理方案[J].计算机研究与发展,2010,47(5):911-920
[4] Lee J,Kapitanova K,Son S H.The price of security in wireless sensor networks [J].Computing Network Journal,Elsevier,2010,54(17):2967-2978
[5] Oliveira L B,Aranha D F,Gouvea C P L,et al.TinyPBC:Pai-rings for authenticated identity-based non-interactive key distribution in sensor networks [J].Computing Communication Journal,Elsevier,2011,34(3):485-493
[6] Hagras E A,EI-Saied D,Aly H H.Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks [C]∥28th National Radio Science Conf(NRSC).2011
[7] Riaz R,Naureen A,Akram A,et al.A unified security frame-work with three key management schemes for wireless sensor networks[J].Computing Communication Journal,Elsevier,2008(31):4269-4280
[8] Du X,Guizani M,Xiao Y,et al.A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks [J].IEEE Transactions Wireless Communication,2009,8(3):1223-1229
[9] Mizanur R,Sk M,El-Khatib K.Private key agreement and secure communication for heterogeneous sensor networks [J].Parallel Distribution Computing,Elsevier,2010(70):858-870
[10] Khaliq-ur-Rahman Raazi S M,Lee H,Lee S,et al.MUQAMI+:A scalable and locally distributed key management scheme for clustered sensor networks [J].Annalso of Telecommunications,Springer,2010,65(1/2):101-116
[11] Stavrou E,Pitsillides A.A survey on secure multipath routing protocols in WSNs [J].Computing Network Journal, 2010(54):2215-2238
[12] Alagheband M R,Aref M R.Dynamic and secure key management model for hierarchical heterogeneous sensor networks [J].IET Information Security,2012,6(4):271-280
[13] Zhan Guo-xing,Shi Wei-song,Deng Ju-lia.Design and imple-mentation of TARFA trust-aware routing framework for WSNs [J].IEEE Transactions on Dependable and Secure Computing,2012,9(2):184-197

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!