Skip to main content

An Elliptic-Curve-Based Hierarchical Cluster Key Management in Wireless Sensor Network

  • Conference paper
Intelligent Computing, Networking, and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 243))

Abstract

In wireless sensor networks (WSN), because of the absence of physical protection and unattended deployment, the wireless connections are prone to different types of attacks. Hence, security is a measure concern in WSN. Moreover, the limited energy, memory, and computation capability of sensor nodes lead to difficulty in implementing security mechanisms effectively. In this paper, we proposed an elliptic-curve-based hierarchical cluster key management scheme (ECHCKM), which is very much secure, has better time complexity, and consumes reasonable amount of energy. The proposed work uses digital signature scheme and encryption–decryption mechanisms using elliptic curve cryptography (ECC). As it is using ECC, the same level of security can be achieved with smaller key size compared to other mechanisms. The result shows that the proposed work is faster than Hamed and Khamy’s work, and it also guards against different types of attacks. Energy consumption, number of messages exchanged, and key storage are three other aspects addressed in this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33, 63–75 (2010)

    Article  Google Scholar 

  2. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11, 52–73 (2009)

    Article  Google Scholar 

  3. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8, 2–23 (2006) (2nd quarter)

    Google Scholar 

  4. Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. NAI Labs, Technical report 00-010, (2000)

    Google Scholar 

  5. Naureen, A., Kim, K., Ahmed, F.: Performance and security assessment of a PKC based key management scheme for hierarchical sensor networks. IEEE Commun. 163–167 (2008)

    Google Scholar 

  6. Jabeenbegum, S., Purusothaman, T.: A cluster based cost effective contributory key agreement protocol for secure group communication. In: Proceedings of IEEE on 2nd International Conference on Computing, Communication and Networking, pp. 1–12 (2010)

    Google Scholar 

  7. Dahshan, H., Irvine, J.: An elliptic curve distributed key management for mobile ad hoc networks. IEEE Commun. 1–5 (2010)

    Google Scholar 

  8. Hamed, A., EL-Khamy, S.: New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on elliptic curve cryptography. In: Proceedings of 26th National Radio Science Conference, NRSC, pp. 1–13 (2009)

    Google Scholar 

  9. Heinzelman, R., Chandrakasan, A., Balakrishnan, H.: Energy efficient communication protocol for wireless microsensor network. In: Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS’00), Maui, Jan 2000

    Google Scholar 

  10. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Certicom Corporation (2001)

    Google Scholar 

  11. Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wirel. Commun. 11, 62–67 (2004)

    Google Scholar 

  12. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, vol. 3156, pp. 925–943. Springer, Berlin, (2004)

    Google Scholar 

  13. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York, Inc; ISBN 0-387-95273-X; (2004)

    Google Scholar 

  14. Brown, M.: PGP in constrained wireless devices. In: Proceedings of 9th USENIX Security Symposium, Aug 2000

    Google Scholar 

  15. Wander, S., Gura, N., Eberle, H., Gupta, V., Shantz, C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of 3rd IEEE on International Conference Pervasive Computing and Communications, PerCom ‘05 pp. 324–328, Mar 2005

    Google Scholar 

  16. Simplicio, A., Barreto, M., Margi, B.: A survey on key management mechanisms for distributed wireless sensor networks. Comput. Netw. 54 (2010) Elsevier

    Google Scholar 

  17. Hook, D.: Beginning Cryptography with Java. Wrox Press, UK, ISBN:0764596330, (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srikanta Kumar Sahoo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Sahoo, S.K., Sahoo, M.N. (2014). An Elliptic-Curve-Based Hierarchical Cluster Key Management in Wireless Sensor Network. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1665-0_38

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1664-3

  • Online ISBN: 978-81-322-1665-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics