Abstract
Wireless sensor networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. However, due to the influence of environment and dynamic topology, the communication radiuses of all nodes are not strictly consistent, which may cause different neighbor numbers and redundant neighbors for each central node. In this paper, we present a key agreement scheme without the trusted third parties by exploiting the special characteristics of Hopfield neural network: the two nodes converge in a steady state from their initial states respectively after iterating finite times, while maintaining the confidentiality of the key by quantifying the key to strings. Compared to existing solutions, the proposed method requires less memory and has lower communication overheads to key agreement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ang, G., Wei, W., Zhixiao, W., Yan, W.: A hierarchical authentication scheme for the different radio ranges sensor network. In: 2009 International conference on Computational Science and Engineering, pp. 494–501 (2009)
Hailun, T., Sanjay, J., Diet, O., John, Z., Vijay, S.: Secure multi-hop network programming with multiple one-way key chains. In: Proceeding of the First ACM Conference on Wireless Network Security, pp. 206–211 (2008)
Ang, G., Wei, W., Zhi, W.: Hopfield-association: establishing a shared key in the wireless sensor networks. In: 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 70–73 (2010)
Deng, J., Han, R., Mishra, S.: Defending against path-based dos attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 195–199 (2005)
Deb, B., Bhatnagar, S., Nath, B.: ReInForM:Reliable information forwarding using multiple paths in sensor networks. In: 28th Annual IEEE Conference on Local Computer Networks, pp. 350–354 (2003)
Heinzelman, W.R., Chandrakasan, A., Balarkrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 36–49 (2002)
Chan, H., Perrig, A., Song, D.: Random Key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 56–67 (2003)
Suhas, M., Wade, T., Narayan, M., Chunxuna, Y., Alex, R.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM MobiCom, pp. 236–242 (2008)
Chang, C.C., Chang, Y.F.: Efficient anonymous auction protocol with freewheeling bids. Comput. Secur. 22(8), 728–734 (2003)
Jiang, R., Pan, L., Li, J.H.: An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2), 169–174 (2005)
Ye, F., Luo, H, Lu, S., Zhang, L.: Statistical route-filtering of injected false data in sensor networks. In: Proceeding IEEE INFOCOM, pp. 453–457 (2004)
Hwang, M.S., Lu, J.L., Lin, C.: Adding timestamps to the electronic auction protocol. Data Knowl. Eng. 40(2), 155–162 (2002)
Horng, T.L., Wen, S.J., Chi, K.L.: An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2), 1487–1497 (2006)
Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 126–135 (1994)
Rivest, R.L., Shamir, A., Adleman, M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 489–499 (1982)
Housley, R., Hoffman, P.: Internet X.509 pubic key infrastructure operational protocols: FTP and HTTP. IEEE Commun. 203–227 (1999)
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM Mobicom 2008, pp. 522–530 (2008)
Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wirel. Netw. 10(2), 1254–1263 (2002)
Perrig, A., Szewczyk, V., Wen, D.C., Tygar, J.D.: SPINS: security protocols for sensor networks. J. Wirel. Netw. 8(5), 521–534 (2002)
Savo, G.G.: Optimal Transmission Radius in Sensor Networks. Advanced Wireless Sensor Network: 4G Technologies, pp. 568–571. Wiley, New York (2006)
Whit, D., Martin, H.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 962–977 (2010)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS 2002, pp. 520–523 (2002)
Xu, Y., Heidemann, E.J.: Geography-informed energy conservation for ad hoc routing. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 56–59 (2001)
Liming, S., Guiming, G.: A survey on energy efficient protocols for wireless. Commun. China Comput. Fed. (CCF) 7(4), 13–16 (2002)
Acknowledgement
This work was supported in part by Projects (61170245, U1304603) supported by the National Natural Science Foundation of China; Project (2014B520099) supported by Henan Province Education Department Natural Science Foundation; Project (142102210471, 142102210063, 142102210568) supported by Natural Science and Technology Research of Foundation Project of Henan Province Department of Science; Projects (1401037A) supported by Natural Science and Technology Research of Foundation Project of Luoyang Department; the science and technology research project of education department of Henan Province (14A510009), the funding scheme for youth teacher of Henan Province (2012GGJS-191); China Postdoctoral Science Foundation under Grant (2014M562153), Projects (1201430560) supported by Guangzhou Education Bureau Science Foundation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sun, Z., Wu, W., Xing, X., Li, C., Nie, Y., Cao, Y. (2015). A Hierarchical Shared Key Algorithm in Wireless Sensor Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-27161-3_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27160-6
Online ISBN: 978-3-319-27161-3
eBook Packages: Computer ScienceComputer Science (R0)