Abstract
Security plays a vital role in Wireless Sensor Networks and attention on key part is essential to encrypt the information processing among the sensor nodes in the network. Due to sensor node constraint, Key Management plays an important role. Existing Key Management Schemes (KMS) for Cluster-based architecture either supports Group communication or Node-to-Node communication. The proposed hybrid KMS concentrates on both Group communication and Node-to-Node communication using LU matrix and to enhance the strength of the security between cluster head and base station the ElGamal Public key encryption techniques is used. The main feature of this proposed protocol is 100% Node-to-Node connectivity and perfect resilience is achieved when Sensor node/Cluster Head is compromised. The scheme and its detailed performance analysis are discussed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security (2002)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213, May 11-14 (2003)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor network. In: Proc. of the 10th ACM Conference on Computer and Communications (SecurityCCS 2003), pp. 42–51 (2003)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52–61 (2003)
Younis, M.F., Ghumman, K., Eltoweissy, M.: Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 17(8), 865–882 (2006)
Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Prentice Hall, Englewood Cliffs (2005)
Wen, M., Zheng, Y., Li, H., Chen, K.: A hierarchical composition of LU matrix-based key distribution scheme for sensor networks. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4819, pp. 608–620. Springer, Heidelberg (2007)
Dai, H., Xu, H.: Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix. IEEE Sensors Journal (August 2010)
Blundo, C., DeSantis, A., Herzberg, A., et al.: Perfectly-secure key distribution for dynamic conference. Inf. Comput. 146(1), 1–23 (1998)
Eltoweissy, M., Heydari, H., Morales, L., Sadborough, H.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Systems Management 12(1), 33–50 (2004)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The Tesla Broadcast Authentication Protocol. RSA CryptoBytes 5 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Doraipandian, M., Rajapackiyam, E., Neelamegam, P., Rai, A.K. (2011). An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matrix. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 192. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22720-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-22720-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22719-6
Online ISBN: 978-3-642-22720-2
eBook Packages: Computer ScienceComputer Science (R0)