TLKMS: A Dynamic Keys Management Scheme for Large-Scale Wireless Sensor Networks

  • Huanzhao Wang
  • Dongwei Luo
  • Yufei Guo
  • Qingping Zhao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4706)

Abstract

For address the issue of key management in the large-scale wireless sensor networks, we propose TLKMS(Two-Level Key Management Scheme)which will be used in clustered sensor networks based on EBS system. In this paper, we show the detail of dynamic keys management scheme which has master and slayer two levels. It works from the deployment of sensor nodes to the end of networks to manage all of the sensor nodes’ keys. And regarding of the specialty of sensor networks, the scheme is separated to three phases which are initialization phase, steady phase and update phase. The experiment shows that the sensor nodes in our scheme only need to store fewer keys and the whole network performs good ability in keep network elasticity.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Laurent, E., Virgil, D.G.: A key-management scheme for distributed sensor network. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47. ACM Press, New York (2002)Google Scholar
  2. 2.
    Chan, H., et al.: Key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  3. 3.
    Liu, D., Ning, P.: Location-Based Pairwise Key Establishments for Static Sensor Networks. In: Proc. 1st ACM Workshop on Security of Ad. Hoc. and Sensor Networks, pp. 72–82. ACM Press, New York (2003)CrossRefGoogle Scholar
  4. 4.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security, pp. 27–30. ACM Press, New York (2003)Google Scholar
  5. 5.
    Blom, R.: An optimal class of symmetric key generation systems[A]. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)Google Scholar
  6. 6.
    Du, W., et al.: A pairwise key predistrubution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61. ACM Press, New York (2003)Google Scholar
  7. 7.
    An, F., Cheng, X.: PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. In: Jajodia, S., Wijesekera, D. (eds.) IFIP WG 11.3. LNCS, vol. 3654, pp. 992–1001. Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Du, W., Deng, J., et al.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of IEEE INFOCOM’04, Hong Kong, pp. 586–597. IEEE Press, Los Alamitos (2004)Google Scholar
  9. 9.
    Karlof, C., David, W.: Secure routing in wireless sensor networks: Attacks and countermeasures. Journal of Ad. Hoc. Networks 1(3), 293–315 (2003)CrossRefGoogle Scholar
  10. 10.
    Eltoweissy, M., Wadaa, A., et al.: Group key management scheme for Large-Scale wireless sensor network. Journal of Ad. Hoc. Networks 3(5), 668–688 (2005)CrossRefGoogle Scholar
  11. 11.
    Younis, M., Youssef, M., Arisha, K.: Energy-Aware management in Cluster-based sensor networks. Computer Networks 43(5), 649–668 (2003)CrossRefGoogle Scholar
  12. 12.
    Younis, M., Ghumman, K., Eltoweissy, M.: Key Management in Wireless Ad. Hoc. Networks: Collusion Analysis and Prevention. In: IEEE(IPCCC’05), Phoenix Arizona, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  13. 13.
    Chorzempa, M., Park, J.M: SECK:Survivable and Efficient Clustered Keying for Wireless Sensor Networks. In: IEEE International Performance,Computing and Communications Conference, Phoenix, USA, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  14. 14.
    Huanzhao, W., Dongwei, L.: Study on Dynamic Key Management of Clustered Sensor Networks. International Journal of Computer Science and Network Security 6(6), 245–252 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Huanzhao Wang
    • 1
  • Dongwei Luo
    • 1
  • Yufei Guo
    • 1
  • Qingping Zhao
    • 1
  1. 1.School of Electronics & Information Engineering, Xi’an Jiaotong University, Xi’an Shaanxi 710049China

Personalised recommendations