Skip to main content

An Efficient and Secure Session Key Management Scheme for Cluster Based Wireless Sensors Networks

  • Conference paper
Pervasive Computing and the Networked World (ICPCA/SWS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8351))

Abstract

Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprises of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to well balance between the security level and the associated energy consumption overhead to mitigate the security risks. In this paper, we present an Efficient and Secure Session Key Management Scheme for Cluster-Based Wireless Sensors Networks (ESSKM). The proposed technique based on symmetric key mechanism, provides an improved session key establishment by updating periodically the session key within a cluster, hence avoids different type of attacks from malicious nodes and mitigates the node compromise attack. Finally, through the network simulator tool (NS-2), the security analysis and performance simulation demonstrate that ESSKM not only achieves efficient security, but also provides energy saving with low storage overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2), 63–75 (2010)

    Article  Google Scholar 

  2. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for WSNs. In: Proc. of the 33rd Hawaii International Conference on System Sciences, Washington (2000)

    Google Scholar 

  3. Modirkhazeni, A., Ithnin, N., Ibrahim, O.: Empirical Study on Secure Routing Protocols in Wireless Sensor Networks. International Journal of Advancements in Computing Technology 2(5), 25–41 (2010)

    Article  Google Scholar 

  4. Lee, J., Leung, V., Wong, K., Cao, J., Chan, H.: Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications 14(5), 76–84 (2007)

    Article  Google Scholar 

  5. Otway, D., Rees, O.: Efficient and Timely Mutual Authentication. Operating Systems Review 21, 8–10 (1987)

    Article  Google Scholar 

  6. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, New York, pp. 62–72 (2003)

    Google Scholar 

  7. Cheng, Y., Agrawal, D.: An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks (Elsevier) 5(1), 35–48 (2007)

    Article  Google Scholar 

  8. Oliveira, L.B., Ferreira, A., Vilaca, M.A., et al.: SecLEACH-on the security of clustered sensor networks. Signal Processing 87(12), 2882–2895 (2007)

    Article  MATH  Google Scholar 

  9. Banerjee, P., Jacobson, D., Lahiri, S.N.: Security and performance analysis of a secure clustering protocol for sensor networks. In: Proc. 6th IEEE Intl. Symposium on Network Computing and Applications, pp. 145–152 (2007)

    Google Scholar 

  10. Ferreira, A.C., Vilaca, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.: On the security of cluster-based communication protocols for wireless sensor networks. In: Proc. 4th IEEE International Conference on Networking (ICNŠ05), pp. 449–458 (2005)

    Google Scholar 

  11. Chen, J.J.-R., Sahoo, P.K., Sun, P.-T.: Efficient security mechanisms for the distributed wireless sensor networks. In: Proceedings of the IEEE Third International Conference on Information Technology and Applications (ICITA 2005), vol. 2, pp. 62–72 (2005)

    Google Scholar 

  12. Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. of the 10th Annual Network and Distributed System Security Symposium, California (2003)

    Google Scholar 

  13. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)

    Google Scholar 

  14. NS-2 web site, http://www.isi.edu/nsnam/ns

  15. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - the Advanced Encryption Standard. Springer-Verlag New York (2002)

    Google Scholar 

  16. Cam, H., Ozdemir, S., Nair, P., Muthuavinashiappan, D., Sanli, H.O.: Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications 29(4), 446–455 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Diop, A., Qi, Y., Wang, Q. (2014). An Efficient and Secure Session Key Management Scheme for Cluster Based Wireless Sensors Networks. In: Zu, Q., Vargas-Vera, M., Hu, B. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2013. Lecture Notes in Computer Science, vol 8351. Springer, Cham. https://doi.org/10.1007/978-3-319-09265-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09265-2_5

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09264-5

  • Online ISBN: 978-3-319-09265-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics