A Hash Key-Based Key Management Mechanism for Cluster-Based Wireless Sensor Network

Authors

  • Sachin D. Babar Sinhgad Techincal Education Society, Pune, Maharashtra, India
  • Parikshit N. Mahalle Sinhgad Techincal Education Society, Pune, Maharashtra, India

DOI:

https://doi.org/10.13052/2245-1439.524

Keywords:

Wireless sensor network (WSNs), security, cluster-based, key management, hash key

Abstract

The growth of wireless sensor networks (WSNs) in the last few years, enhances the use, efficiency, and accuracy of a large number of applications such as defense, habitat monitoring, industrial, and many more. The performance of WSNis largely affected by the security, as large numbers of security attack are happening on the WSN. Therefore, it is necessary to have a security solution to use theWSN proficiently. The objective of this paper is to address the security problem of WSN by proposing the key management mechanism to establish the secure link for communication. The paper proposes the cluster-based key management technique based on hash key mechanism. The mechanism considers the key establishment and verification at two levels, one at onehop distance and the other at multi-hop destination. The proposed work is evaluated by considering the varying number of attackers in the network. The mechanism shows reduced packet lost rate and energy consumption as compared with one-hop key management solutions, by making the tradeoff of delay. The results shows the improvement in packet loss rate i.e., without any solution, if attack happens obviously the attack performance reduces with an increase in pack loss rate and after applying the solution, the packet loss rate is reduced.

 

Downloads

Download data is not yet available.

Author Biographies

Sachin D. Babar, Sinhgad Techincal Education Society, Pune, Maharashtra, India

S. D. Babar is ISTE Life Member. He is awarded the Ph.D. Degree in Computer Engineering from Aalborg University, Denmark in the area of Wireless communication on 25th Feb 2015. He is graduated in Computer Engineering from Savitribai Phule Pune University, Maharashtra, India in 2002 and received Master in Computer Engineering from Savitribai Phule Pune University, Maharashtra, India in 2006. He is currently working as Professor and Head in the department of Computer Engineering, Sinhgad Institute of Technology, Lonavala, India. He has 15 years of teaching and research experience. He has published more than 30 papers at national and international level. He has authored two books on subjects like Software Engineering and Analysis of Algorithm & design. He has received the Cambridge International Certificate for Teachers and Trainers at Professional level under MISSION10X Program. He is IBM DB2 certified professional. His research interests are Data Structures, Algorithms, Theory of Computer Science, IoT and Security.

Parikshit N. Mahalle, Sinhgad Techincal Education Society, Pune, Maharashtra, India

P. N. Mahalle has obtained his B.E. degree in Computer Science and Engineering from Sant Gadge Baba Amravati University, Amravati, India and M.E. degree in Computer Engineering from Savitribai Phule Pune University, Pune, India. He completed his Ph.D. in Computer Science and Engineering specialization in Wireless Communication from Aalborg University, Aalborg, Denmark. He has more than 16 years of teaching and research experience. Currently he is working as Professor and Head in Department of Computer Engineering at STES’s Smt. Kashibai Navale College of Engineering, Pune, India. He has published 61 research publications at national and international journals and conferences with 265 citations and H index 8. He has 5 Patents to his credit. He has authored 8 books at National and International level. He has guided more than 100 plus undergraduate students and 20 plus post-graduate students for projects. His recent research interests include Algorithms, Internet of Things, Identity Management and Security.

References

Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., and Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Comput. Commun. 30, 2314–2341.

Zhang, J., and Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33, 63–75.

Babar, S. D., Prasad, N. R., and Prasad, R. (2013). Activity modelling and countermeasures on jamming attack. J. Cyber Secur. Mobil. 2, 1–22.

Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., and Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tut. 11, 42–56.

Raymond, D. R. and Midkiff, S. F. (2008). “Denial-of-service in wireless sensor networks: attacks and defences.” IEEE Pervasive Comput. 7, 74–81.

Tianm, B., Han, S., and Dillon, T. (2009). “A key management scheme for heterogeneous sensor networks using Keyed-Hash chain,” in Proceedings of the Mobile Ad-hoc and Sensor Networks ’09, Fujian, 448–456.

Bechkit, W., Challal, Y., Bouabdallah, A., and Bencheikh A. (2010). “An efficient and highly resilient key management scheme for wireless sensor networks,” in Proceedings of the 35th IEEE LCN, Denver, CO, 216–219.

Zhou, R., and Yang, H. (2011). “A hybrid key management scheme for heterogeneous wireless sensor networks based on ecc and trivariate symmetric polynomial,” in Proceedings of the IEEE URKE, Bali, 251–255.

Ronghua, Q., Qi, S., Xing, Y., and Xiaobing, Y. (2012). “A key management scheme for manually deployed wireless sensor networks based on dual directional hash chains,” in Proceedings of the IEEE ISDEA, Sanya, 752–755.

Cui, B., Wang, Z., Guo, T., Dong, G., and Zhao, B. (2013). “UBKM: A usage-based key management protocol for distributed sensor networks”, in Proceedings of the IEEE EIDWT, Xi’an. 267–272.

Hsieh, W.-B., and Leu, J.-S. (2013). “A dynamic identity user authentication scheme in wireless sensor networks”, in Proceedings IEEE IWCMC, Sardinia, 1132–1137.

Corbett, D. J., Ruzzelli, A. G., Everitt, D., and O’hare, G. (2006). A Procedure for Benchmarking MAC Protocols used in Wireless Sensor Networks Technical Report 593. Sydeney, NSM: University of Sydeney, 1–28.

Downloads

Published

2017-01-27

How to Cite

1.
Babar SD, Mahalle PN. A Hash Key-Based Key Management Mechanism for Cluster-Based Wireless Sensor Network. JCSANDM [Internet]. 2017 Jan. 27 [cited 2024 Apr. 16];5(2):73-88. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5195

Issue

Section

Articles