IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 2    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 2, February 2011
An Efficient Key Management Scheme for Wireless Network
Full Text(PDF, 3000)  PP.  
Author(s)
Yogendra Kumar Jain, Vismay Jain
KEYWORDS
Wireless Sensor Networks, Secure triple key, Routing algorithms, Localization technique
ABSTRACT
Sensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. Key Management is a major challenge to achieve security in wireless sensor networks. In most of the schemes presented for key management in wireless sensor networks, it is assumed that the sensor nodes have the same capability. This research presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in sensor networks. The proposed framework consists of four interacting components: a secure triple-key (STKS) scheme, secure routing algorithms (SRAs), a secure localization technique (SLT) and a malicious node detection mechanism. Singly, each of these components can achieve certain level of security. However, when deployed as a framework, a high degree of security is achievable. WSNSF takes into consideration the communication and computation limitations of sensor networks. While there is always a tradeoff between security and performance, experimental results prove that the proposed framework can achieve high degree of security, transmission overheads and perfect resilience against node capture.
References
[1] Reza Azarderakhsh, Arash Reyhani-Masoleh, and Zine- Eddine Abid, “A Key Management Scheme for Cluster BasedWireless Sensor Networks “,2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[2] Asif Habib, “Sensor Network Security Issues at Network Layer” 2nd International Conference on Advances in Space Technologies, IEEE 2008.

[3] Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou, “Sensor Network Security: A Survey” ,IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 11, NO. 2, SECOND QUARTER 2009.

[4] Anderson, R., Chan, H. and Perrig, A. (2004) Key infection: smart trust for smart dust. In Proceedings of the 12th IEEE International Conference on Network Protocols, Oct 5-8, 2004,

[5] Anjum, F., Pandey, S. and Agrawal, P. (2005) Secure localization in sensor networks using transmission range variation. In Proceedings of IEEE MASS 2005 Workshop, November 7-11, 2005.

[6]Axelsson, S. (2000) Intrusion detection systems: a survey and taxonomy. Research Report. 15 March 2000. Göteborg, Sweden, Department of Computer Engineering, Chalmers University of Technology. Available at http://www.mnlab.cs.depaul.edu/seminar/spr2003/IDSSurv ey.pdf

[7]Cam, H., Ozdemir, S., Muthuavinashiappan, D. and Nair, P. (2003) Energy efficient security protocol for wireless sensor networks. In Proceedings of 58th IEEE Vehicular Technology Conference, Oct. 6-9, 2003,

[8]Chan, H., Perrig, A. and Song, D. (2003) Random key redistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, 11-14 May 2003.

[9]Choi, S.H., Kim, B.K., Park, J., Kang, C.H. and Eom, D.S. (2004) An implementation of wireless sensor networks. IEEE Transactions on Consumer Electronics.

[10] Chong, C.Y. and Kumar, S.P. (2003) Sensor networks: evolution, opportunities and challenges. IEEE Transactions on Consumer Electronics.

[11] Du, W., Deng, J., Han, Y., Chen, S.S. and Varshney, P.K. (2004) A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE InfoCom, March 7-11, 2004.

[12] Jianmin Zhang, Qingmin Cui and Xiande Liu, “An Efficient Key Management Scheme for Wireless Sensor Networks in Hostile Environments”, IEEE 2009 International Conference on Multimedia Information Networking and Security.

[13] C.Gnana Kousalya and Dr.J. Raja, “An Energy Efficient Traffic-Based Key Management Scheme for Wireless Sensor Networks ” IEEE 2009 International Conference on Networking and Digital Society.

[14] Xing Zhang, Jingsha He and Qian Wei, “An Energy- Efficient Dynamic Key Management Scheme in Wireless Sensor Networks”, IEEE 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[15] Yong Ho Kim, Hwaseong Lee, and Dong Hoon Lee, “A secure and efficient key management scheme for wireless sensor networks”, This research was supported by the MIC(Ministry of Information and Communication), Korea, (IITA-2006-(C1090-0603-0025)).

[16] Guorui Li, Ying Wang and Jingsha He, “Efficient Group Key Management Scheme in Wireless Sensor Networks”, IEEE 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.

Untitled Page