Group-Based Secure Communication for Large- Scale Wireless Sensor Networks
نویسندگان
چکیده
Achieving security in resource-constrained wireless sensor networks is a challenging research task. Many key management schemes have been developed recently to provide secure communication between source and destination in wireless sensor networks. A serious threat highlighted in all of these schemes is that of node capture attacks, where an adversary gains full control over a sensor node through direct physical access. The compromised sensor node can be an aggregator node, cluster head node or a normal sensor node. This can lead an adversary to compromise the communication of an entire sensor network which creates a high risk for data confidentiality. Solving this problem with limited resources is a major challenge. Ignoring the security issues related to data aggregation can bring large damage to a sensor network. Nonetheless data aggregation brings significant advantages in terms of reducing the amount of data transmitted between source and destination and thereby conserving energy. However data aggregation schemes are generally designed without considering the possible security consequences relating to data confidentiality. To deal with the above issues we therefore propose a novel and distinct Structure and Density Independent Group Based Key Management Protocol which forms part of our broader work looking at security issues in Wireless Sensor Networks. This protocol provides better secure communication, secure data aggregation, data confidentiality, and resilience against node capture and replication attacks. The protocol has been evaluated using different topologies both with and without group structures and compared against existing schemes. Evaluation results show a significant improvement in resilience against node capture attacks, confidentiality, memory overhead and connectivity.
منابع مشابه
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009