Advertisement

Multi-Level Dynamic Key Management for Scalable Wireless Sensor Networks with UAV

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 214)

Abstract

Wireless Sensor Networks (WSNs) are more vulnerable to security attacks than wired networks because of their wireless and dynamic nature. In today’s WSNs, the sensor nodes act not only as routers but also as communication endpoints, and they are also responsible for the security of the messages. Therefore, it is important to define whether an incoming message originates from a trustworthy node or not. The main solution for this is the usage of cryptographically signed messages. There are two main classifications for signing messages: namely symmetric and asymmetric algorithm based cryptography. In the asymmetric key cryptography, public/private key pairs are used to encrypt and decrypt messages. However, it can cause severe computational, memory, and energy overhead for the nodes. On the other side, symmetric key cryptography is superior to asymmetric key cryptography in terms of speed and low energy cost, but at the same time, it needs to design an efficient and flexible key distribution schemes for improving system performance. In this paper, it is aimed to set a multi-level dynamic key management system for WSNs with the aid of an Unmanned Aerial Vehicle (UAV) as a key distribution and coordination center for asymmetric keys. Public keys of the sensor nodes are dispatched by UAVs and symmetric keys set with these key combinations. Evaluation results show the proposed system is scalable, and its performance is considerably better than single asymmetric key management systems

Keywords

WSN Security Encryption Symmetric key Asymmetric key 

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 104–112 (2002)CrossRefGoogle Scholar
  2. 2.
    Chen, M., Kwon, T., Choi, Y.: Mobile agent-based directed diffusion in wireless sensor networks. EURASIP J. Adv. Signal Process. 2007 (2007)Google Scholar
  3. 3.
    Sahingoz, O.K.: Mobility of users in sinkless wireless Sensor networks. In: International Workshop on Telecommunications-IWT 2011, Rio de Janeiro, Brazil (2011)Google Scholar
  4. 4.
    Roy, S., Conti, M., Setia, S., Jajodia, S.: Secure data aggregation in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 7(3), 1040–1052 (2012)CrossRefGoogle Scholar
  5. 5.
    Rasheed, A., Mahapatra, R.N.: The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE Trans. Parallel Distrib. Syst. 23(5), 958–965 (2012)CrossRefGoogle Scholar
  6. 6.
    Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)CrossRefGoogle Scholar
  7. 7.
    Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11–12), 2314–2341 (2007)CrossRefGoogle Scholar
  8. 8.
    Huang, H.F.: A new design of efficient key pre-distribution scheme for secure wireless sensor networks. In: Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), vol. 1, pp. 253–256 (2007)Google Scholar
  9. 9.
    Chan, H., Perrig. A.: Random key predistribution schemes for sensor networks. In: 2003 IEEE Symposium on Security and Privacy, pp. 197–213 (2003)Google Scholar
  10. 10.
    Munivel, E., Ajit, G.M.: Efficient public key infrastructure implementation in wireless sensor networks. In: International Conference on Wireless Communication and Sensor Computing (ICWCSC 2010), pp. 1–6 (2010)Google Scholar
  11. 11.
    Ren, K., Yu, S., Lou, W., Zhang, Y.: Multi-user broadcast authentication in wireless sensor networks. IEEE Trans. Veh. Technol. 58(8), 4554–4564 (2009)CrossRefGoogle Scholar
  12. 12.
    Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), pp. 324–328 (2005)Google Scholar
  13. 13.
    Sun Microsystems, Inc, Project Sun SPOT: Sun small programmable object technology (online). available: http://www.sunspotworld.com/. Accessed 30 May 2012
  14. 14.
    Current public-key cryptographic systems. In: A Certicom Whitepaper, Certicom, pp. 1–6 (1997)Google Scholar
  15. 15.
    Boyle, D.E., Newe, T.: On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled wireless sensor networks. Sens. Actuators A Phys. 156(2), 394–405 (2009)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Turkish Air Force Academy Computer Engineering DepartmentIstanbulTurkey

Personalised recommendations