Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks

  • A. S. Poornima
  • B. B. Amberker
Part of the Communications in Computer and Information Science book series (CCIS, volume 40)


Cluster based organization is widely used to achieve energy efficiency in Wireless Sensor Networks(WSN). In order to achieve confidentiality of the sensed data it is necessary to have secret key shared between a node and its cluster head. Key management is challenging as the cluster head changes in every round in cluster based organization. In this paper we are proposing deterministic key establishment protocols, which ensures that always there exists a secret key between node and its cluster head. The proposed protocols establishes key in an efficient manner every time a cluster head is changed. The hash based protocol achieves key establishment with very minimal storage at each node and by performing simple computations like one way hash functions and EX-OR operations. Where as the polynomial-based protocol establishes key in every round by using preloaded information without performing any additional communication.


Cluster-based WSN Seed value Cluster head Sensor Node Key Matrix 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bandyopadhyay, S., Coyle, E.: An energy efficient hierarchical clustering algorithm for wireless sensor networks. In: 22 nd Conference of the IEEE Communication Society, INFOCOM, vol. 3 (2003)Google Scholar
  2. 2.
    Younis, O., Fahmy, S.: Distributed clustering in adhoc sensor networks: a hybrid, energy-efficient approach. In: 23rd Conference of the TEEE Computers and Communication Societies, pp. 629–640 (2004)Google Scholar
  3. 3.
    Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference Computer and Communications security, November 2002, pp. 41–47 (2002)Google Scholar
  4. 4.
    Chan, H., Perrig, A., Song, D.: Random key pre distribution schemes for sensor networks. In: IEEE symposium on Research in Security and Privacy, pp. 197–213 (2003)Google Scholar
  5. 5.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computers and Communication Security (CCS 2003), pp. 52–61 (2003)Google Scholar
  6. 6.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conference of Computers and Communication Security (CCS 2003), pp. 42–51 (2003)Google Scholar
  7. 7.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks. In: Proc. of 10th ACM Conference on Computers and Communication Security (CCS 2003) (2003)Google Scholar
  8. 8.
    Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure Communication in Ad Hoc Networks: A Probabilistic approach. In: 11th IEEE International conference on Network Protocols (ICNP 2003) (2003)Google Scholar
  9. 9.
    Pietro, R.D., Mancini, L.V., Mei, A.: Random Key assignment to secure wireless sensor networks. In: 1st ACM workshop on Security of Ad Hoc and Sensor Networks (2003)Google Scholar
  10. 10.
    Hwang, J., Kim, Y.: Revisiting random key pre distribution schemes for WSN. In: Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43–52 (2004)Google Scholar
  11. 11.
    Cheng, Y., Agrawal, D.P.: Efficient pairwise key establishment and management in static wireless sensor networks. In: Second IEEE International Conference on Mobile ad hoc and Sensor Systems (2005)Google Scholar
  12. 12.
    Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient Communication protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conference on System Sciences, January 2000, pp. 4–5 (2000)Google Scholar
  13. 13.
    Bohge, M., Trappe, W.: An authentication framework for hierarchical ad hoc sensor networks. In: 2003 ACM workshop on Wireless Security, pp. 79–87 (2003)Google Scholar
  14. 14.
    Oliveira, L.B., Wong, H.C., Loureiro, A.A.F.: Lha=sp: Secure protocols for hierarchical wireless sensor networks. In: 9th IFIP/IEEE International Symposium on Integrated Network Management (IM 2005), pp. 31–44 (2005)Google Scholar
  15. 15.
    Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.F.: On the security of cluster-based communication protocols for wireless sensor networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  16. 16.
    Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: SecLeach: A random key distribution solution for securing clustered sensor networks. In: 5th IEEE International symposium on network computing and applications, pp. 145–154 (2006)Google Scholar
  17. 17.
    N.F.P.180-1. Secure hash standard. Draft, NIST (May 1994)Google Scholar
  18. 18.
    Rivest, R.: The MD5 message-digest algorithm. RFC 1321 (April 1992)Google Scholar
  19. 19.
    Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • A. S. Poornima
    • 1
  • B. B. Amberker
    • 2
  1. 1.Dept. of Computer Science and EnggSiddaganga Institute of TechnologyTumkurIndia
  2. 2.Dept. of Computer Science and EnggNational Institute of TechnologyWarangalIndia

Personalised recommendations