Skip to main content

An Efficient Key Management Scheme for Advanced Metering Infrastructure

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

Abstract

In this paper we focus on key management scheme for a specific WSN application such as Advanced Metering Infrastructure (AMI), which is based on hierarchical tree network and performs metering data aggregation along the tree. We utilize a novel identity based key generation and propose a hierarchical key management algorithm based on encapsulated encryption. Through experiments, we prove that the proposed key management scheme is suitable for small embedded networked systems which have energy, memory, and processing constraints.

K.-i. Hwang––This work was supported by the Industrial Core Technology Development Program (10049009, Development of Main IPs for IoT and Image-Based Security Low-Power SoC) funded by the Ministry of Trade, Industry & Energy, and also supported by a grant (12-TI-C01) from Advanced Water Management Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Vamsi, P.R., Kant, K.: A taxonomy of key management schemes of wireless sensor networks. In: 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT), vol. 690(696), pp. 21–22 (2015)

    Google Scholar 

  2. Bala, S., Sharma, G., Verma, A.K.: Classification of Symmetric Key Management Schemes for Wireless Sensor Network. International Journal of Security and Its Applications 7(2), March 2013

    Google Scholar 

  3. Lee, J., Stinson, D.R.: Deterministic key pre-distribution schemes for distributed sensor networks. In: ACM Symposium on Applied Computing 2004, Waterloo, Canada. Lecture Notes in Computer Science, vol. 3357, pp. 294–307 (2004)

    Google Scholar 

  4. Blom, R.: Theory and application of cryptographic techniques. In: Proceedings of the Eurocrypt 84 Workshop on Advances in Cryptology, pp. 335–338. Springer, Berlin (1984)

    Google Scholar 

  5. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)

    Google Scholar 

  6. Jang, J., Kwon, T., Song, J.: A time-based key management protocol for wireless sensor networks. In: Proceedings of ISPEC. LNCS, vol. 4464, pp. 314–328 (2007)

    Google Scholar 

  7. Liu, D.G., Ning, P., Li, R.F.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)

    Article  Google Scholar 

  8. Delgosha, F., Fekri, F.: A Multivariate Key-Establishment Scheme for Wireless Sensor Networks. IEEE Transactions on wireless communications 8(4) (2009)

    Google Scholar 

  9. Das, A.: Improving Identity-based Random Key Establishment Scheme for Large-scale Hierarchical Wireless Sensor Networks. International Journal of Network Security 14(1), 1–21 (2012)

    Google Scholar 

  10. Liu, D., Ning, P.: Improving Key Pre-Distribution with Deployment Knowledge In Static Sensor Networks. ACM Transactions on Sensor Networks 1(2), 204–239 (2005)

    Article  Google Scholar 

  11. Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 1(8), 41–77 (2005)

    Article  Google Scholar 

  12. Liu, D., Ning, P.: Location-based pair-wise key establishment for static sensor networks. In: Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (2003)

    Google Scholar 

  13. Liu, D., Ning, P.: Establishing pair-wise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security CCS 2003 (2003)

    Google Scholar 

  14. Zhang, W., Tran, M., Zhu, S., Cao, G.: A random perturbation-based scheme for pairwise key establishment in sensor networks. In: Proceedings of MOBIHOC 2007, Montréal, Québec, Canada (2007)

    Google Scholar 

  15. Eschenauer, L., Gligor, V.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security, CCS 2002, pp 41–47 (2002)

    Google Scholar 

  16. Bloom, R.: An optimal class of symmetric key generation systems. In: Proceedings of EUROCRYPT 84, pp 335–338 (1985)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kwang-il Hwang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kim, MS., Park, SK., Kim, HS., Hwang, Ki. (2015). An Efficient Key Management Scheme for Advanced Metering Infrastructure. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics