An efficient key management protocol for wireless sensor networks

EDP Sciences - Tập 11 - Trang 1927-1930 - 2006
Zeng Qingguang1, Cui Yanling1, Luo Juan1
1School of Computer and Communication, Hunan University, Changsha Hunan, China

Tóm tắt

Key management is a fundamental security service in wireless sensor networks. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the design and implementation of an efficient key management scheme based on low energy adaptive clustering hierarchy (LEACH) for wireless sensor networks. The design of the protocol is motivated by the observation that many sensor nodes in the network play different roles. The paper presents different keys are set to the sensors for meeting different transmitting messages and variable security requirements. Simulation results show that our key management protocol based-on LEACH can achieve better performance. The energy consumption overhead introduced is remarkably low compared with the original Kerberos schemes.

Tài liệu tham khảo

Avancha S, Undercoffer J L, Joshi A,et al. Secure Sensor Networks for Perimeter Protection [J].Computer Networks, November 2003,43(4): 421–435. Perrig A, Szewczyk R, Wen V,et al. SPINS: Security Protocols for Sensor Networks [J].Wireless Networks, 2002,8 (5): 521–534. Chan H, Perrig A, Song D. Random Key Pre-distribution Schemes for Sensor Networks [C]//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, USA, May 11–14, 2003: 197–213. Eschenauer L, Gligor V D. A Key management Scheme for Distributed Sensor Networks [C]//Proceedings of the 9th ACM Conference on Computer and Communication Security. Washington, D C, USA, Nov 18–22, 2002: 41–47. Zhu L, Satia S, Jajodia S. LEAP: Effcient Security Mechanisms for Large-scale Distributed Sensor Networks [C]// Proceedings of ACM Conf on Computing and Communication Security (CCS' 2003). Washington, Oct 27–31, 2003: 62–72. Gaurav J, Mustafa K C. A Low-Energy Key Management Protocol for Wireless Sensor Networks [C]// Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC' 03). Turkey, June 30- July 3, 2003,1: 335–340. Carman D, Kruus P, Matt B. Constraints and Approaches for Distributed Sensor Network Security [R/OL]. [2005-02-30].http://download.nai.com/products/media/nai/zip/nailab-repor-00-010-final.zip. Heinzelman W, Chandrakasan A, Balakrishnan H. Energyefficient Communication Rrotocol for Wireless Microsensor Networks [C]// Proceedings of the 33rd Annual Hawaii Int Conf on System Sciences. Hawaii, Jan. 4–7. 2000: 3005–3014. Neuman B C, Ts'o Theodore. Kerberos: An Authentication Service for Computer Networks [J].IEEE Communications, September 1994,32(9): 33–38. Liu Donggang, Ning Peng. Improving Key Predistribution with Deployment Knowledge in Static Sensor Networks [J].ACM Transactions on Sensor Networks, 2005,1(2): 204–239.