Abstract
Confidentiality, integrity, and authentication services are critical to preventing an adversary from compromising the security of a Wireless Sensor Network (WSN). An essential component of any key-based security solution is managing the encryption keys to providing this protection. Hence, we propose a novel group key management scheme based on the key-chain tree mechanism for the clustered WSNs in this paper. In this scheme, the functions of key management are decoupled and distributed among multiple network elements of the clustered WSNs for providing compromise/failure resistance. This scheme also supports rekeying to enhance network security and survivability against the node capture. Analysis results show that the scheme does provide a secure encryption of the messages even if the revoked sensor nodes collude with each other or the cluster head is compromised.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks 38(4), 393–422 (2002)
Perrig, A., Stankovic, J.A., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47, 53–57 (2004)
Eschenauer, L., Gligor, V.D.: A Key Management Scheme for Distributed Sensor Networks. In: Proc. of CCS’02, pp. 41–47 (2000)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks. In: Security and Privacy (2004)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proc. of SNPA’03, pp. 113–127 (2003)
Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35, 54–62 (2002)
Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35(3), 309–329 (2003)
Gober, P., Ziviani, A., Todorova, P., Amorim, M.D., Hunerberg, P., Fdida, S.: Topology Control and Localization in Wireless Ad Hoc and Sensor Networks. Ad Hoc & Sensor Networks 1, 301–322 (2005)
Wang, P., Ning, P., Reeves, D.S.: Storage-Efficient Stateless Group Key Revocation. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 25–38. Springer, Heidelberg (2004)
Harney, H., Muckenhirn, C.: Group Key Management Protocol (GKMP) Specification. RFC 2093, Internet Soc. (1997)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. RFC 2627, Internet Soc. (1999)
Wong, K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. IEEE/ACM Trans. Networking 8(1), 16–30 (2000)
Canetti, R., Malkin, T.G., Nissim, K.: Efficient Communication-Storage Tradeoffs for Multicast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–474. Springer, Heidelberg (1999)
Perrig, A., Song, D., Tygar, J.: ELK, A New Protocol for Efficient Large-Group Key Distribution. In: Proc. of Security and Privacy (2001)
Brisco, B.: MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Proc. of WNGC’99 (1999)
Setia, S., Koussih, S., Jajodia, S.: Kronos: A Scalable Group Rekeying Approach for Secure Multicast. In: Proc. of Security and Privacy (2001)
Boyd, C.: On Key Agreement and Conference Key Agreement. In: Proc. of Information Security and Privacy (1997)
Rodeh, O., Birman, K., Dolev, D.: Optimized Group Rekey for Group Communication Systems. In: Proc. of NDSS’00 (2000)
Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing Key Distribution with Revocation. In: Proc. of ISSP’02, pp. 224–240 (2002)
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
Eltoweissy, M., Heydari, H., Morales, L., Sadborough, H.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Systems Management 12(1), 33–50 (2004)
Duma, D., Shahmehri, N., Lambrix, P.: A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements. In: Proc. of WETICE’03 (2003)
Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proc. of ISRSP’03, pp. 197–213 (2003)
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Trans. on Information and System Security 8(1), 41–77 (2005)
Chen, H., Ying, B., Chen, B., Mineno, H., Mizuno, T.: A Low Energy Key Management Scheme in Wireless Sensor Networks. In: CHINACOM’06 (2006)
Ying, B., Chen, H., Zhao, W., Qiu, P.: An Energy-Aware Key Management Scheme in Wireless Sensor Networks. In: Proc. of ICICIC’06 (2006)
Eltoweissy, M.: Younis. M.F., Ghumman. K.: Group Key Management Scheme for Large-Scale Wireless Sensor Network. Ad Hoc Networks, 796–802 (2005)
Younis, M.F., Ghumman, K., Eltoweissy, M.: Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Trans. On Parallel and Distributed Systems 17(8), 865–882 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Chen, H., Mineno, H., Obashi, Y., Kokogawa, T., Mizuno, T. (2007). KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks. In: Lee, YH., Kim, HN., Kim, J., Park, Y., Yang, L.T., Kim, S.W. (eds) Embedded Software and Systems. ICESS 2007. Lecture Notes in Computer Science, vol 4523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72685-2_58
Download citation
DOI: https://doi.org/10.1007/978-3-540-72685-2_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72684-5
Online ISBN: 978-3-540-72685-2
eBook Packages: Computer ScienceComputer Science (R0)