Skip to main content

Advertisement

Log in

Mobility Based Key Management Security Scheme for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In wireless sensor networks (WSNs) handling mobility of nodes in key management is a challenging task. In this paper, a mobility management technique for keying scheme of WSNs is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pairwise keys for nodes are generated by the sink through exclusion basis systems. Whenever a node moves from currently connected cluster to another in the network, the mobility based key management scheme is triggered. The sink verifies the authenticity of roaming node and allocates it to a nearby cluster. New pairwise keys are generated and transmitted to the roaming node through newly connected cluster head. Further, a key organization technique is presented to ensure the forward and backward secrecy of nodes. The proposed technique is simulated in NS2 and simulation results show the efficiency of our technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. de Brito, L. M. P. L., & Peralta, L. M. R. (2008). An analysis of localization problems and solutions in wireless sensor networks. Polytechnical Studies Review, 6(9), 1–27.

    Google Scholar 

  2. Lee, H., & Aghajan, H. (2005). Collaborative self-localization techniques for wireless image sensor networks. In Proceedings of the asilomar conference on signals, systems and computer s.

  3. Abuhelaleh, M. A., & Elleithy, K. M. (2010). Security in wireless sensor networks: Key management module in SOOAWSN. International Journal of Network Security & Its Applications (IJNSA), 4, 67–78.

    Article  Google Scholar 

  4. Lalitha, T. (2012). Energy efficient cluster based key management & authentication technique for wireless sensor networks. European Journal of Scientific Research, 76(3), 403–410.

    Google Scholar 

  5. Jeong, Y. S., & Lee, S. H. (2006). Secure key management protocol in the wireless sensor network. Inter J. Inform. Proc. Syst. 2.

  6. Dwoskin, J., Xu, D., Huang, J., Chiang, M., & Lee, R. (2007). Secure key management architecture against sensor-node fabrication attacks. In Proceedings of the IEEE global telecommunications confe rence, Nov. 26–30 (pp. 166–171). Washington, DC: IEEE Xplore Press. doi:10.1109/GLOCOM.2007.39

  7. Jain, Y. K., & Jain, V. (2011). An efficient key management scheme for wireless network. International Journal of Scientific and Engineering, 2(2), 1–7.

  8. Maala, B., Bettahar, H., & Bouabdallah, A. (2008). Performances of key management schemes in wireless sensor networks. Singapore: World Scientific Rev.

    Google Scholar 

  9. Shen, L., & Shi, X. (2008). A dynamic cluster-based key management protocol in wireless sensor networks. International Journal of Intelligent Control and Systems, 13, 146–151.

    Google Scholar 

  10. Kim, Y. H., Lee, H., & Lee, D. H. (2007). A secure and efficient key management scheme for wireless sensor networks. In Third International Conference on Security and Privacy in Communications Networks and the Workshops, Sept. 17–21 (pp. 162–167). Nice, France: IEEE Xplore Press. doi:10.1109/SECCOM.2007.4550324

  11. Shaikh, R. A., Jameel, H., Auriol, B. J., Lee, H., Lee, S., & Song et al., Y. J. (2010). Achieving network level privacy in wireless sensor networks. Sensors, 10(3), 1447–1472.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Lalitha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lalitha, T., Jayaprabha, S. Mobility Based Key Management Security Scheme for Wireless Sensor Networks. Wireless Pers Commun 87, 349–367 (2016). https://doi.org/10.1007/s11277-015-2872-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2872-6

Keywords

Navigation