Advertisement

An Efficient Key Establishment Protocol for Wireless Sensor Networks

  • Yassin Maleh
  • Abdellah Ezzati
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 366)

Abstract

Wireless sensor network represents a new perspective for many applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However, due to limited resources of sensors and hostile environments in which they could be deployed, this type of networks is vulnerable to several types of attacks similar to those occurring in ad hoc networks. Therefore, it is necessary to use effective mechanisms to protect this type of network. Cryptography can play an important role in detecting and preventing security attacks. Our contribution is intended for applications using the WSN nodes with low mobility and require a high level of security. Unlike most methods in the literature for specific topologies, our security scheme can cover both the needs of flat and hierarchical topologies. In this paper, we proposed a new lightweight cryptography algorithm based on LEAP+. Simulations results of the proposed model are presented using TOSSIM simulator and the complexity of the protocol is analyzed and compared with other symmetric schemes.

Keywords

Wireless sensor network Cryptography Key management Key establishment LEAP+ Performance evaluation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Huang, A.: Security Primitives for Ultra-Low Power Sensor Nodes in Wireless Sensor Networks, Faculty of Engineering, the Built Environment and Information Technology University of Pretoria (2005)Google Scholar
  2. 2.
    Gaubatz, G., Kaps, J., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited, Department of Electrical & Computer Engineering Worcester Polytechnic Institute, 100 Institute Road, Worcester, MA 01609, USAGoogle Scholar
  3. 3.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks 8(5), 521–534, September 2002Google Scholar
  4. 4.
    Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications 29(2), 216–230 (2006)CrossRefGoogle Scholar
  5. 5.
    Zhu, S., Setia, S., Jajodia, S.: LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500–528 (2006)CrossRefGoogle Scholar
  6. 6.
    Lim, C.H.: LEAP++: a robust key establishment scheme for wireless sensor networks. IEEE (2008). doi: 10.1109/ICDCS.Workshops.2008.93
  7. 7.
    Wen, H., Luo, J., Zhou, L.: Lightweight and effective detection scheme for node clone attack in wireless sensor networks. IET Wirel. Sens. Syst. 1(3), 137–143 (2011). doi: 10.1049/iet-wss.2010
  8. 8.
    Choi, H., Zhu, S., La Porta, T.F.: SET: detecting node clones in Sensor Networks, Department of Computer Science and Engineering, Pennsylvania State UniversityGoogle Scholar
  9. 9.
    Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Sensor Networks, North Carolina State UniversityGoogle Scholar
  10. 10.
    Wang, Y.-T., Bagrodia, R.: ComSen: a detection system for identifying compromised nodes in wireless sensor networks. In: SECURWARE 2012: The Sixth International Conference on Emerging Security Information, Systems and TechnologiesGoogle Scholar
  11. 11.
    Atakli, I.M., Hu, H., Chen, Y., Ku, W.-S., Su, Z.: Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Simulation of Systems Security (SSSS 2008), Ottawa, Canada, April 14–17, 2008Google Scholar
  12. 12.
    Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: accurate and scalable simulation of entire tinyos applications. In: SenSys 2003, Los Angeles, California, USA, November 5–7, 2003Google Scholar
  13. 13.
    Levis, P., Lee, N.: TOSSIM: a simulator for TinyOS networks, September 17, 2003Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2016

Authors and Affiliations

  1. 1.LAVETE Laboratory, Faculty of Science and TechnologyHassan 1st UniversitySettatMorocco

Personalised recommendations