DOI QR코드

DOI QR Code

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks

  • Jiang, Rong (School of Computer, National University of Defense Technology) ;
  • Luo, Jun (School of Computer, National University of Defense Technology) ;
  • Wang, Xiaoping (School of Computer, National University of Defense Technology)
  • Received : 2013.06.13
  • Accepted : 2013.07.22
  • Published : 2013.08.31

Abstract

In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.

Keywords

References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
  2. X. Wang, J. Luo, Y. Liu, S. Li, and D. Dong, "Component-based localization in sparse wireless networks," IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 540-548, Apr. 2011. https://doi.org/10.1109/TNET.2010.2072965
  3. R. Deng, J. Chen, C. Yuen, P. Cheng, and Y. Sun, "Energy-Efficient Cooperative Spectrum Sensing by Optimal Scheduling in Sensor-Aided Cognitive Radio Networks," IEEE Transactions on Vehicular Technology, vol. 61, no.2, pp. 716-725, Feb. 2012. https://doi.org/10.1109/TVT.2011.2179323
  4. P. Cheng, R. Deng, and J. Chen, "Energy-Efficient Cooperative Spectrum Sensing in Sensor-Aided Cognitive Radio Networks," IEEE Wireless Communications, vol.19,no.6, pp. 100-105, Dec. 2012. https://doi.org/10.1109/MWC.2012.6393524
  5. R. Jiang, J. Luo, and X. Wang, "An attack tree based risk assessment for location privacy in wireless sensor networks," in Proc. of 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, Sep. 21-23, 2012.
  6. C. Lai, H. Li, Y. Zhang, and J. Cao, "Security issues on machine to machine communications," KSII Transaction on Internet and Information Systems, vol. 6, no. 2, pp. 498-514, Feb. 2012.
  7. M. Wen, J. Li, Z. Yin, et al., "A NTRU Based Key Generation and Data Transmission Scheme for Sensor Networks," Journal of Computational Information Systems, vol. 8, no.6, pp. 2417-2424, June, 2012.
  8. M. Wen, Y. Zheng, W. Ye, K. Chen, and W. Qiu, "A key management protocol with robust continuity for sensor networks," Computer Standards & Interfaces, vol. 31, no. 4, pp. 642-647, Apr. 2009. https://doi.org/10.1016/j.csi.2008.06.005
  9. C. Lai, H. Li, X. Li, and J. Cao, "A novel group access authentication and key agreement protocol for machine-type communication," Transactions on Emerging Telecommunications Technologies, 2013.
  10. R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 1, pp. 32-43, Jan. 2012. https://doi.org/10.1109/TPDS.2011.95
  11. S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003. https://doi.org/10.1145/937503.937506
  12. R. Jiang, J. Luo, F. Tu, and J. Zhong, "LEP: A lightweight key management scheme based on EBS and polynomial for wireless sensor networks," in Proc. of IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, Sep. 14-16, 2011.
  13. C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000. https://doi.org/10.1109/90.836475
  14. L. Lazos and R. Poovendran, "Secure broadcast in energy-aware wireless sensor networks," DTIC Document, Tech. Rep., 2002.
  15. R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga, "LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks," in Proc. of IEEE International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 6-9, 2003.
  16. J.-H. Huang, J. Buckingham, and R. Han, "A level key infrastructure for secure and efficient group communication in wireless sensor network," in Proc. of the IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 249-260, Sept. 2005.
  17. J.-H. Son, J.-S. Lee, and S.-W. Seo, "Topological key hierarchy for energy-efficient group key management in wireless sensor networks," Wireless personal communications, vol. 52, no. 2, pp. 359-382, Jan. 2010. https://doi.org/10.1007/s11277-008-9653-4
  18. A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, Sept. 2002. https://doi.org/10.1023/A:1016598314198
  19. Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
  20. M. Shi, X. Shen, Y. Jiang, and C. Lin, "Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 38-46, Oct. 2007. https://doi.org/10.1109/MWC.2007.4396941
  21. J. Polastre, R. Szewczyk, C. Sharp, and D. Culler, "The mote revolution: Low power wireless sensor network devices," in Proc. of IEEE HotChips 16, vol. 16, pp. 22-24, 2004.
  22. D. Wei, S. Kaplan, and H. A. Chan, "Energy efficient clustering algorithms for wireless sensor networks," in Proc. of IEEE International Conference on Communications Workshops, pp. 236-240, May 19-23, 2008.
  23. D.-Y. Kim, J. Cho, and B.-S. Jeong, "Practical data transmission in cluster-based sensor networks." KSII Transact0ions on Internet and Information Systems (TIIS), vol. 4, no. 3 pp. 224-242, June 2010.
  24. R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed efficient source privacy preservation scheme for wireless sensor networks," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-6, May 23-27, 2010.
  25. X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Communications and Mobile Computing (Wiley), vol. 10, no. 6, pp. 843-856, June, 2010.
  26. T. I. Inc, "Single-chip 2.4GHz IEEE 802.15.4 compliant and Zigbee (TM) ready RF transceiver," Tech. Rep., 2007.