Skip to main content

Binary Tree Based Cluster Key Management Scheme for Heterogeneous Sensor Networks

  • Conference paper
Trends in Network and Communications (WeST 2011, NeCoM 2011, WiMoN 2011)

Abstract

Many applications of wireless sensor networks are used to achieve energy efficiency and require secure data communications. To achieve security in wireless sensor networks, it is important to be able to encrypt the messages sent between sensor nodes. The key management task is challenging due to resource constrained nature of wireless sensor networks. We are introducing two key management methods for wireless sensor networks, which can handle events like node addition, node compromise and key refresh at regular intervals. The first one is Binary Tree Based Method, used to generate Cluster Key CK, for intra cluster communication and Common Cluster Key CCK, for inter cluster communication. The second one is DH Key Exchange Method performs key management with minimum communication and storage at each node which ensures the security from eavesdropping and internal attacks. Our Key management methods avoid the usage of public key in communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chan, H., Perrig, A., Song, D.: Random key pre distribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  2. Cheng, Y., Agrawal, D.P.: Efficient pairwise key establishment and management in static wireless sensor networks. In: Second IEEE International Conference on Mobile Ad Hoc and Sensor Systems (2005)

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM Conference of Computers and Communication Security (CCS 2003), pp. 42–51 (2003)

    Google Scholar 

  4. Du, X., GUizani, M., Xiao, Y., Ci, S., Chen, H.H.: A Routing-Driven Elliptic Curve Cryptography based Key Mangement scheme for Heterogeneous Sensor Networks. IEEE Transactions on Wireless Communications

    Google Scholar 

  5. Du, X., Lin, F.: Maintaining Differential coverage in heterogeneous sensor network. EURASIP Journal of Wireless Communications and Networking (4), 565–572 (2005)

    Google Scholar 

  6. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference Computer and Communications Security, pp. 41–47 (November 2002)

    Google Scholar 

  7. Hwang, J., Kim, Y.: Revisiting random key pre distribution schemes for WSN. In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 43–52 (2004)

    Google Scholar 

  8. Hussain, S., Kausar, F., Masood, A.: An Efficient Key Distribution Scheme for Heterogeneous Sensor Networks. In: IWCMC 2007 (2007)

    Google Scholar 

  9. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computers and Communication Security (CCS 2003), pp. 52–61 (2003)

    Google Scholar 

  10. Lu, K., Qian, Y., Hu, J.: A framework for distributed key management schemes in heterogeneous wireless sensor networks. In: IEEE International Performance Computing and Communications Conference, pp. 513–519 (2006)

    Google Scholar 

  11. Pietro, R.D., Mancini, L.V., Mei, A.: Random Key assignment to secure wireless sensor networks. In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (2003)

    Google Scholar 

  12. Samuel, S.: Cryptanalysis of Number Theoretic Ciphers. CRC Press, Boca Raton (2003)

    MATH  Google Scholar 

  13. Wong, C., Gouda, M., Lam, S.: Secure Group Communication Using key Graphs. In: Proceedings of the ACM SIGCOMM 1998 (October 1998)

    Google Scholar 

  14. Zheng, X., Huang, C.-T., Matthews, M.: Chinese Remainder Theorem Based Group Key Management. In: ACMSE (2007)

    Google Scholar 

  15. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks. In: Proc. of 10th ACM Conference on Computers and Communication Security, CCS 2003 (2003)

    Google Scholar 

  16. Zhou, L., Ravishankar, C.V.: Efficient, authenticated, and fault-tolerant key agreement for dynamic peer groups. Technical Report 88, Dept. of Computer Science and Engineering, University of California, Riverside (2003)

    Google Scholar 

  17. Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the CCS 2000 (2000)

    Google Scholar 

  18. Shen, L., Shi, X.: A Dynamic Cluster-based Key Management Protocol in Wireless Sensor Networks. International Journal of Intelligent Control and Systems 13(2), 146–151 (2008)

    MathSciNet  Google Scholar 

  19. McGrew, D.A., Sherman, A.T.: Key Establishment in Large Dynamic Groups Using One Function Trees

    Google Scholar 

  20. Lee, P., Lui, J., Yau, D.: Distributed collaborative key agreement protocols for dynamic peer groups. Technical report, Dept. of Computer Science and Engineering, Chinese University of Hong Kong (2002)

    Google Scholar 

  21. Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the CCS 2000 (2000)

    Google Scholar 

  22. Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11 (2000)

    Google Scholar 

  23. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (November 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dharavath, R., Bhima, K., Sri Vidya Shankari, K., Jagan, A. (2011). Binary Tree Based Cluster Key Management Scheme for Heterogeneous Sensor Networks. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Trends in Network and Communications. WeST NeCoM WiMoN 2011 2011 2011. Communications in Computer and Information Science, vol 197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22543-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22543-7_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22542-0

  • Online ISBN: 978-3-642-22543-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics