A Hash Key-Based Key Management Mechanism for Cluster-Based Wireless Sensor Network
Keywords:Wireless sensor network (WSNs), security, cluster-based, key management, hash key
The growth of wireless sensor networks (WSNs) in the last few years, enhances the use, efficiency, and accuracy of a large number of applications such as defense, habitat monitoring, industrial, and many more. The performance of WSNis largely affected by the security, as large numbers of security attack are happening on the WSN. Therefore, it is necessary to have a security solution to use theWSN proficiently. The objective of this paper is to address the security problem of WSN by proposing the key management mechanism to establish the secure link for communication. The paper proposes the cluster-based key management technique based on hash key mechanism. The mechanism considers the key establishment and verification at two levels, one at onehop distance and the other at multi-hop destination. The proposed work is evaluated by considering the varying number of attackers in the network. The mechanism shows reduced packet lost rate and energy consumption as compared with one-hop key management solutions, by making the tradeoff of delay. The results shows the improvement in packet loss rate i.e., without any solution, if attack happens obviously the attack performance reduces with an increase in pack loss rate and after applying the solution, the packet loss rate is reduced.
Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., and Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Comput. Commun. 30, 2314–2341.
Zhang, J., and Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33, 63–75.
Babar, S. D., Prasad, N. R., and Prasad, R. (2013). Activity modelling and countermeasures on jamming attack. J. Cyber Secur. Mobil. 2, 1–22.
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., and Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tut. 11, 42–56.
Raymond, D. R. and Midkiff, S. F. (2008). “Denial-of-service in wireless sensor networks: attacks and defences.” IEEE Pervasive Comput. 7, 74–81.
Tianm, B., Han, S., and Dillon, T. (2009). “A key management scheme for heterogeneous sensor networks using Keyed-Hash chain,” in Proceedings of the Mobile Ad-hoc and Sensor Networks ’09, Fujian, 448–456.
Bechkit, W., Challal, Y., Bouabdallah, A., and Bencheikh A. (2010). “An efficient and highly resilient key management scheme for wireless sensor networks,” in Proceedings of the 35th IEEE LCN, Denver, CO, 216–219.
Zhou, R., and Yang, H. (2011). “A hybrid key management scheme for heterogeneous wireless sensor networks based on ecc and trivariate symmetric polynomial,” in Proceedings of the IEEE URKE, Bali, 251–255.
Ronghua, Q., Qi, S., Xing, Y., and Xiaobing, Y. (2012). “A key management scheme for manually deployed wireless sensor networks based on dual directional hash chains,” in Proceedings of the IEEE ISDEA, Sanya, 752–755.
Cui, B., Wang, Z., Guo, T., Dong, G., and Zhao, B. (2013). “UBKM: A usage-based key management protocol for distributed sensor networks”, in Proceedings of the IEEE EIDWT, Xi’an. 267–272.
Hsieh, W.-B., and Leu, J.-S. (2013). “A dynamic identity user authentication scheme in wireless sensor networks”, in Proceedings IEEE IWCMC, Sardinia, 1132–1137.
Corbett, D. J., Ruzzelli, A. G., Everitt, D., and O’hare, G. (2006). A Procedure for Benchmarking MAC Protocols used in Wireless Sensor Networks Technical Report 593. Sydeney, NSM: University of Sydeney, 1–28.