Skip to main content

KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks

  • Conference paper
Embedded Software and Systems (ICESS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4523))

Included in the following conference series:

Abstract

Confidentiality, integrity, and authentication services are critical to preventing an adversary from compromising the security of a Wireless Sensor Network (WSN). An essential component of any key-based security solution is managing the encryption keys to providing this protection. Hence, we propose a novel group key management scheme based on the key-chain tree mechanism for the clustered WSNs in this paper. In this scheme, the functions of key management are decoupled and distributed among multiple network elements of the clustered WSNs for providing compromise/failure resistance. This scheme also supports rekeying to enhance network security and survivability against the node capture. Analysis results show that the scheme does provide a secure encryption of the messages even if the revoked sensor nodes collude with each other or the cluster head is compromised.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Perrig, A., Stankovic, J.A., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47, 53–57 (2004)

    Article  Google Scholar 

  3. Eschenauer, L., Gligor, V.D.: A Key Management Scheme for Distributed Sensor Networks. In: Proc. of CCS’02, pp. 41–47 (2000)

    Google Scholar 

  4. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks. In: Security and Privacy (2004)

    Google Scholar 

  5. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proc. of SNPA’03, pp. 113–127 (2003)

    Google Scholar 

  6. Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35, 54–62 (2002)

    Google Scholar 

  7. Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35(3), 309–329 (2003)

    Article  Google Scholar 

  8. Gober, P., Ziviani, A., Todorova, P., Amorim, M.D., Hunerberg, P., Fdida, S.: Topology Control and Localization in Wireless Ad Hoc and Sensor Networks. Ad Hoc & Sensor Networks 1, 301–322 (2005)

    Google Scholar 

  9. Wang, P., Ning, P., Reeves, D.S.: Storage-Efficient Stateless Group Key Revocation. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 25–38. Springer, Heidelberg (2004)

    Google Scholar 

  10. Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification. RFC 2093, Internet Soc. (1997)

    Google Scholar 

  11. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. RFC 2627, Internet Soc. (1999)

    Google Scholar 

  12. Wong, K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. IEEE/ACM Trans. Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  13. Canetti, R., Malkin, T.G., Nissim, K.: Efficient Communication-Storage Tradeoffs for Multicast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–474. Springer, Heidelberg (1999)

    Google Scholar 

  14. Perrig, A., Song, D., Tygar, J.: ELK, A New Protocol for Efficient Large-Group Key Distribution. In: Proc. of Security and Privacy (2001)

    Google Scholar 

  15. Brisco, B.: MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Proc. of WNGC’99 (1999)

    Google Scholar 

  16. Setia, S., Koussih, S., Jajodia, S.: Kronos: A Scalable Group Rekeying Approach for Secure Multicast. In: Proc. of Security and Privacy (2001)

    Google Scholar 

  17. Boyd, C.: On Key Agreement and Conference Key Agreement. In: Proc. of Information Security and Privacy (1997)

    Google Scholar 

  18. Rodeh, O., Birman, K., Dolev, D.: Optimized Group Rekey for Group Communication Systems. In: Proc. of NDSS’00 (2000)

    Google Scholar 

  19. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing Key Distribution with Revocation. In: Proc. of ISSP’02, pp. 224–240 (2002)

    Google Scholar 

  20. Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  21. Eltoweissy, M., Heydari, H., Morales, L., Sadborough, H.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Systems Management 12(1), 33–50 (2004)

    Article  Google Scholar 

  22. Duma, D., Shahmehri, N., Lambrix, P.: A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements. In: Proc. of WETICE’03 (2003)

    Google Scholar 

  23. Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proc. of ISRSP’03, pp. 197–213 (2003)

    Google Scholar 

  24. Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Trans. on Information and System Security 8(1), 41–77 (2005)

    Article  Google Scholar 

  25. Chen, H., Ying, B., Chen, B., Mineno, H., Mizuno, T.: A Low Energy Key Management Scheme in Wireless Sensor Networks. In: CHINACOM’06 (2006)

    Google Scholar 

  26. Ying, B., Chen, H., Zhao, W., Qiu, P.: An Energy-Aware Key Management Scheme in Wireless Sensor Networks. In: Proc. of ICICIC’06 (2006)

    Google Scholar 

  27. Eltoweissy, M.: Younis. M.F., Ghumman. K.: Group Key Management Scheme for Large-Scale Wireless Sensor Network. Ad Hoc Networks, 796–802 (2005)

    Google Scholar 

  28. Younis, M.F., Ghumman, K., Eltoweissy, M.: Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Trans. On Parallel and Distributed Systems 17(8), 865–882 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yann-Hang Lee Heung-Nam Kim Jong Kim Yongwan Park Laurence T. Yang Sung Won Kim

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Chen, H., Mineno, H., Obashi, Y., Kokogawa, T., Mizuno, T. (2007). KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks. In: Lee, YH., Kim, HN., Kim, J., Park, Y., Yang, L.T., Kim, S.W. (eds) Embedded Software and Systems. ICESS 2007. Lecture Notes in Computer Science, vol 4523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72685-2_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72685-2_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72684-5

  • Online ISBN: 978-3-540-72685-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics