MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks

  • Syed Muhammad Khaliq-ur-Rahman Raazi
  • Adil Mehmood Khan
  • Faraz Idris Khan
  • Sung Young Lee
  • Young Jae Song
  • Young Koo Lee
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


In many of the sensor network applications like natural habitat monitoring and international border monitoring, sensor networks are deployed in areas, where there is a high possibility of node capture and network level attacks. Specifically in such applications, the sensor nodes are severely limited in resources. We propose MUQAMI, a locally distributed key management scheme for resilience against the node capture in wireless sensor networks. Our scheme is efficient both in case of keying, re-keying and node compromise. Beauty of our scheme is that it requires minimal message transmission outside the cluster. We base our Scheme on Exclusion Basis System (EBS).


  1. 1.
    I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless Sensor Networks: A Survey, Computer Networks 38(4), 393–422 (2002).CrossRefGoogle Scholar
  2. 2.
    S. Tilak, N.B. Abu-Ghazaleh, and W. Heinzelman, A Taxonomy of Wireless Microsensor Network Models, ACM Mobile Computing and Comm. Rev. 6(2), 1–8 (2002).CrossRefGoogle Scholar
  3. 3.
    M. Eltoweissy, H. Heydari, L. Morales, and H. Sadborough, Combinatorial Optimization of Group Key Management, J. Network and Systems Management 12(1), 33–50 (2004).CrossRefGoogle Scholar
  4. 4.
    G. Dini and I.M. Savino, An Efficient Key Revocation Protocol for Wireless Sensor Networks, International Workshop on Wireless Mobile Multimedia, Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, 450–452 (2006).Google Scholar
  5. 5.
    L. Lamport, Password authentication with insecure communication, Communications of the ACM 24(11), 770–772 (1981).CrossRefMathSciNetGoogle Scholar
  6. 6.
    M. Younis, K. Ghumman, and M. Eltoweissy, Location aware Combinatorial Key Management Scheme for Clustered Sensor Networks, IEEE Trans. Parallel and Distrib. Sys. 17(8), 865–882 (2006).CrossRefGoogle Scholar
  7. 7.
    G. Gupta and M. Younis, Load-Balanced Clustering of Wireless Sensor Networks, Proc. Int’l Conf. Comm. (ICC’ 03), 1848–1852 (2003).Google Scholar
  8. 8.
    O. Younis and S. Fahmy, HEED: A Hybrid, Energy-Efficient, Distributed lustering Approach for Ad Hoc Sensor Networks, IEEE Trans. Mobile Computing 3(4), 366–379 (2004).CrossRefGoogle Scholar
  9. 9.
    K. Langendoen and N. Reijers, Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison, Computer Networks 43(4), 499–518 (2003).zbMATHCrossRefGoogle Scholar
  10. 10.
    A. Youssef, A. Agrawala, and M. Younis, Accurate Anchor-Free Localization in Wireless Sensor Networks, Proc. First IEEE Workshop Information Assurance in Wireless Sensor Networks (WSNIA’ 05), (2005).Google Scholar
  11. 11.
    R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. of the ACM 21(2), 120–126 (1978).zbMATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    A.J. Menezes, P.C.V. Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, (1996).Google Scholar
  13. 13.
    D. Eastlake and P. Jones, US Secure Hash Algorithm 1 (SHA-1), RFC 3174, IETF, (2001).Google Scholar
  14. 14.
    R. Rivest, The MD5 Message-Digest Algorithm, RFC 1320, MIT and RSA Data Security Inc., (1992).Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Syed Muhammad Khaliq-ur-Rahman Raazi
    • 1
  • Adil Mehmood Khan
    • 1
  • Faraz Idris Khan
    • 2
  • Sung Young Lee
    • 1
  • Young Jae Song
    • 3
  • Young Koo Lee
    • 1
  1. 1.Ubiquitous Computing Lab, Department of Computer EngineeringKyung Hee UniversitySuwonSouth Korea
  2. 2.Internet Computing and Security Lab, Department of Computer EngineeringKyung Hee UniversitySuwonSouth Korea
  3. 3.Software Engineering Lab, Department of Computer EngineeringKyung Hee UniversitySuwonSouth Korea

Personalised recommendations