An Elliptic-Curve-Based Hierarchical Cluster Key Management in Wireless Sensor Network

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 243)

Abstract

In wireless sensor networks (WSN), because of the absence of physical protection and unattended deployment, the wireless connections are prone to different types of attacks. Hence, security is a measure concern in WSN. Moreover, the limited energy, memory, and computation capability of sensor nodes lead to difficulty in implementing security mechanisms effectively. In this paper, we proposed an elliptic-curve-based hierarchical cluster key management scheme (ECHCKM), which is very much secure, has better time complexity, and consumes reasonable amount of energy. The proposed work uses digital signature scheme and encryption–decryption mechanisms using elliptic curve cryptography (ECC). As it is using ECC, the same level of security can be achieved with smaller key size compared to other mechanisms. The result shows that the proposed work is faster than Hamed and Khamy’s work, and it also guards against different types of attacks. Energy consumption, number of messages exchanged, and key storage are three other aspects addressed in this work.

Keywords

WSN ECC ECDLP ECDSA ECDH ECDH RCH CH ECHCKM 

References

  1. 1.
    Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33, 63–75 (2010)CrossRefGoogle Scholar
  2. 2.
    Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11, 52–73 (2009)CrossRefGoogle Scholar
  3. 3.
    Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8, 2–23 (2006) (2nd quarter)Google Scholar
  4. 4.
    Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. NAI Labs, Technical report 00-010, (2000)Google Scholar
  5. 5.
    Naureen, A., Kim, K., Ahmed, F.: Performance and security assessment of a PKC based key management scheme for hierarchical sensor networks. IEEE Commun. 163–167 (2008)Google Scholar
  6. 6.
    Jabeenbegum, S., Purusothaman, T.: A cluster based cost effective contributory key agreement protocol for secure group communication. In: Proceedings of IEEE on 2nd International Conference on Computing, Communication and Networking, pp. 1–12 (2010)Google Scholar
  7. 7.
    Dahshan, H., Irvine, J.: An elliptic curve distributed key management for mobile ad hoc networks. IEEE Commun. 1–5 (2010)Google Scholar
  8. 8.
    Hamed, A., EL-Khamy, S.: New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on elliptic curve cryptography. In: Proceedings of 26th National Radio Science Conference, NRSC, pp. 1–13 (2009)Google Scholar
  9. 9.
    Heinzelman, R., Chandrakasan, A., Balakrishnan, H.: Energy efficient communication protocol for wireless microsensor network. In: Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS’00), Maui, Jan 2000Google Scholar
  10. 10.
    Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Certicom Corporation (2001) Google Scholar
  11. 11.
    Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wirel. Commun. 11, 62–67 (2004)Google Scholar
  12. 12.
    Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, vol. 3156, pp. 925–943. Springer, Berlin, (2004)Google Scholar
  13. 13.
    Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York, Inc; ISBN 0-387-95273-X; (2004)Google Scholar
  14. 14.
    Brown, M.: PGP in constrained wireless devices. In: Proceedings of 9th USENIX Security Symposium, Aug 2000Google Scholar
  15. 15.
    Wander, S., Gura, N., Eberle, H., Gupta, V., Shantz, C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of 3rd IEEE on International Conference Pervasive Computing and Communications, PerCom ‘05 pp. 324–328, Mar 2005Google Scholar
  16. 16.
    Simplicio, A., Barreto, M., Margi, B.: A survey on key management mechanisms for distributed wireless sensor networks. Comput. Netw. 54 (2010) ElsevierGoogle Scholar
  17. 17.
    Hook, D.: Beginning Cryptography with Java. Wrox Press, UK, ISBN:0764596330, (2005)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  • Srikanta Kumar Sahoo
    • 1
  • Manmanth Narayan Sahoo
    • 1
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology RourkelaRourkelaIndia

Personalised recommendations