Advertisement

An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks

  • Prithu Banerjee
  • Mahasweta Mitra
  • Ferdous A. Barbhuiya
  • Sandip Chakraborty
  • Sukumar Nandi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7093)

Abstract

Wireless Sensor Networks consist of several autonomous sensors deployed in a distributed fashion for different purposes like that of wildlife tracing, detection of intruders, environment monitoring etc. Efficient multicast is necessary to scale down the exchange of messages for group communication in sensor networks. However incorporating security in wireless sensor group communication is a huge challenge because of the limited resource availability. In this paper, a decentralized rekeying mechanism based on Logical Key Hierarchy is proposed to secure the efficient Hierarchical Geographic Multicast Routing without affecting its actual performance. The proposed protocol, Secure Hierarchical Geographic Multicast Routing (SHGMR) meets all the security requirements necessary for any kind of secure group communication. This protocol is also efficient in terms of scalability as it uses only O(log 2 n max ) message transmissions, where n max is the size of the largest subgroup among all the HGMR cells.

Keywords

Sensor Node Wireless Sensor Network Access Point Message Transmission Forward Secrecy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Su, E.W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: Survey. Journal of Computer Networks 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Chong, C.Y., Kumar, S.P.: Sensor Networks: Evolution, Opportunities, and Challenges. Proceedings of the IEEE 91(8), 1247–1256 (2003)CrossRefGoogle Scholar
  3. 3.
    Koutsonikolas, D., Das, S.M., Hu, Y.C., Stojmenovic, I.: Hierarchical Geographic Multicast Routing for Wireless Sensor Networks. Journal of Wireless Networks 16(2), 449–466 (2010)CrossRefGoogle Scholar
  4. 4.
    Sanchez, J.A., Ruiz, P.M., Stojmnenovic, I.: GMR: Geographic Multicast Routing for Wireless Sensor Networks. In: The 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications, pp. 20–29 (October 2006)Google Scholar
  5. 5.
    Das, S.M., Pucha, H., Hu, Y.C.: Distributed Hashing for Scalable Multicast in Wireless Ad Hoc Networks. IEEE Transaction on Parallel and Distributed System 19(3), 347–362 (2008)CrossRefGoogle Scholar
  6. 6.
    Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  7. 7.
    Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Journal of Wireless Networks 8(5), 521–534 (2002)CrossRefzbMATHGoogle Scholar
  8. 8.
    Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)Google Scholar
  9. 9.
    Wang, Y., Ramamurthy, B.: Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks. In: The Proceeding of IEEE ICC, pp. 3419–3424 (2007)Google Scholar
  10. 10.
    Pietro, R.D., Mancini, L.V., Law, Y.W., Etalle, S.: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: Proceedings of International Conference on Parallel Processing Workshops, pp. 397–406 (October 2003)Google Scholar
  11. 11.
    Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications Using Key Graphs. Department of Computer Sciences, The Univ. of Texas at Austin, Tech. Rep. TR-97-23 (July 1997)Google Scholar
  12. 12.
    Wong, C.K., Gouda, M.G., Lam, S.S.: Secure Group Communication using Key Graphs. IEEE/ACM Transaction on Networking 8(1), 16–30 (2000)CrossRefGoogle Scholar
  13. 13.
    Dondeti, L.R., Mukherjee, S., Samal, A.: A Dual Encryption Protocol for Scalable Secure Multicasting. In: Proceedings of IEEE International Symposium on Computers and Communications (1999)Google Scholar
  14. 14.
    Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications 17(9), 1614–1631 (1999)CrossRefGoogle Scholar
  15. 15.
    Popek, G., Kline, C.: Encryption and Secure Computer Networks. ACM Computing Surveys, 331–356 (December 1979)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Prithu Banerjee
    • 1
  • Mahasweta Mitra
    • 1
  • Ferdous A. Barbhuiya
    • 1
  • Sandip Chakraborty
    • 1
  • Sukumar Nandi
    • 1
  1. 1.Department of Computer Science and EngineeringIndian Institute of Technology GuwahatiIndia

Personalised recommendations