Skip to main content

An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matrix

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 192))

Included in the following conference series:

Abstract

Security plays a vital role in Wireless Sensor Networks and attention on key part is essential to encrypt the information processing among the sensor nodes in the network. Due to sensor node constraint, Key Management plays an important role. Existing Key Management Schemes (KMS) for Cluster-based architecture either supports Group communication or Node-to-Node communication. The proposed hybrid KMS concentrates on both Group communication and Node-to-Node communication using LU matrix and to enhance the strength of the security between cluster head and base station the ElGamal Public key encryption techniques is used. The main feature of this proposed protocol is 100% Node-to-Node connectivity and perfect resilience is achieved when Sensor node/Cluster Head is compromised. The scheme and its detailed performance analysis are discussed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security (2002)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213, May 11-14 (2003)

    Google Scholar 

  3. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  4. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor network. In: Proc. of the 10th ACM Conference on Computer and Communications (SecurityCCS 2003), pp. 42–51 (2003)

    Google Scholar 

  5. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52–61 (2003)

    Google Scholar 

  6. Younis, M.F., Ghumman, K., Eltoweissy, M.: Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 17(8), 865–882 (2006)

    Article  Google Scholar 

  7. Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Prentice Hall, Englewood Cliffs (2005)

    Google Scholar 

  8. Wen, M., Zheng, Y., Li, H., Chen, K.: A hierarchical composition of LU matrix-based key distribution scheme for sensor networks. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 608–620. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Dai, H., Xu, H.: Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix. IEEE Sensors Journal (August 2010)

    Google Scholar 

  10. Blundo, C., DeSantis, A., Herzberg, A., et al.: Perfectly-secure key distribution for dynamic conference. Inf. Comput. 146(1), 1–23 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  11. Eltoweissy, M., Heydari, H., Morales, L., Sadborough, H.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Systems Management 12(1), 33–50 (2004)

    Article  Google Scholar 

  12. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The Tesla Broadcast Authentication Protocol. RSA CryptoBytes 5 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Doraipandian, M., Rajapackiyam, E., Neelamegam, P., Rai, A.K. (2011). An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matrix. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 192. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22720-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22720-2_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22719-6

  • Online ISBN: 978-3-642-22720-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics