Advertisement

An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matrix

  • Manivannan Doraipandian
  • Ezhilarasie Rajapackiyam
  • P. Neelamegam
  • Anuj Kumar Rai
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 192)

Abstract

Security plays a vital role in Wireless Sensor Networks and attention on key part is essential to encrypt the information processing among the sensor nodes in the network. Due to sensor node constraint, Key Management plays an important role. Existing Key Management Schemes (KMS) for Cluster-based architecture either supports Group communication or Node-to-Node communication. The proposed hybrid KMS concentrates on both Group communication and Node-to-Node communication using LU matrix and to enhance the strength of the security between cluster head and base station the ElGamal Public key encryption techniques is used. The main feature of this proposed protocol is 100% Node-to-Node connectivity and perfect resilience is achieved when Sensor node/Cluster Head is compromised. The scheme and its detailed performance analysis are discussed in this paper.

Keywords

LU matrix Wireless Sensor Network Group communication Node-to-Node connectivity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security (2002)Google Scholar
  2. 2.
    Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213, May 11-14 (2003)Google Scholar
  3. 3.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  4. 4.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor network. In: Proc. of the 10th ACM Conference on Computer and Communications (SecurityCCS 2003), pp. 42–51 (2003)Google Scholar
  5. 5.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52–61 (2003)Google Scholar
  6. 6.
    Younis, M.F., Ghumman, K., Eltoweissy, M.: Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 17(8), 865–882 (2006)CrossRefGoogle Scholar
  7. 7.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Prentice Hall, Englewood Cliffs (2005)Google Scholar
  8. 8.
    Wen, M., Zheng, Y., Li, H., Chen, K.: A hierarchical composition of LU matrix-based key distribution scheme for sensor networks. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 608–620. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  9. 9.
    Dai, H., Xu, H.: Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix. IEEE Sensors Journal (August 2010)Google Scholar
  10. 10.
    Blundo, C., DeSantis, A., Herzberg, A., et al.: Perfectly-secure key distribution for dynamic conference. Inf. Comput. 146(1), 1–23 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Eltoweissy, M., Heydari, H., Morales, L., Sadborough, H.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Systems Management 12(1), 33–50 (2004)CrossRefGoogle Scholar
  12. 12.
    Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The Tesla Broadcast Authentication Protocol. RSA CryptoBytes 5 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Manivannan Doraipandian
    • 1
  • Ezhilarasie Rajapackiyam
    • 1
  • P. Neelamegam
    • 1
  • Anuj Kumar Rai
    • 1
  1. 1.School of ComputingSASTRA UniversityThanjavurIndia

Personalised recommendations