Adaptive Hierarchical Key Structure Generation for Key Management in Wireless Sensor Networks using A*
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Adaptive Hierarchical Key Structure Generation for Key Management in Wireless Sensor Networks using A*

Authors: Jin Myoung Kim, Tae Ho Cho

Abstract:

Wireless Sensor networks have a wide spectrum of civil and military applications that call for secure communication such as the terrorist tracking, target surveillance in hostile environments. For the secure communication in these application areas, we propose a method for generating a hierarchical key structure for the efficient group key management. In this paper, we apply A* algorithm in generating a hierarchical key structure by considering the history data of the ratio of addition and eviction of sensor nodes in a location where sensor nodes are deployed. Thus generated key tree structure provides an efficient way of managing the group key in terms of energy consumption when addition and eviction event occurs. A* algorithm tries to minimize the number of messages needed for group key management by the history data. The experimentation with the tree shows efficiency of the proposed method.

Keywords: Heuristic search, key management, security, sensor network.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1062898

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1687

References:


[1] Pietro, R. D., Mancini, L.V., Jajodia, S., "Providing secrecy in key management protocols for large wireless sensors networks," AdHoc Network 1 (2003) 455-468
[2] Lin Yuan, Gang Qu., "Design Space Exploration for Energy Efficient Secure Sensor Network," IEEE ASAP (2002) 88-97.
[3] Mohamed Eltoweissy, Ashraf Wadaa, Stephan Olariu, Larry Wilson, "Group Key management scheme for large-scale sensor networks," Ad Hoc Network 3 (2005) 668-688.
[4] Laurent Eschenauer, Virgil Gligor, D., "A Key Management Scheme for Distributed Sensor Networks," CCS-02 (2002).
[5] Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E., "A Suvey on Sensor Networks," IEEE Communications Magazine 40 (2002) 102-114.
[6] Prasan Kumar Sahoo, Jonathan Jen-Ron Chen, Ping-Tai Sun., "Efficient Security Mechanisms for the Distributed Wireless Sensor Networks," ICITA-50 (2005).
[7] Mohamed Eltoweissy, Mohamed Younis, Kajaldeep Ghumman, "Lightweight Key Management for Wireless Sensor Networks," IEEE International Conference Performance on Computing, and Communications (2004) 813-818.
[8] Carman, D., Kruus, P., Matt, B., "Constraints and approaches for distributed sensor networks security," NAI Technical Report (2000).
[9] Jolly, G., Kuscu, M., Kokate, P., "A hierarchical key management method for low-energy wireless sensor networks," UMBC Online Document. (2002).
[10] Chan, H., Perrig, A., Song, D., "Random key pre-distribution schemes for sensor networks," IEEE 2003 Symposium on Security and Privacy (2003).
[11] Pottie, G. J., Kaiser, W. J., "Wireless Integrated Network Sensors," Communications of the ACM 43 (2000) 51-58.
[12] Wallner, D., Harder, E., Agee, R., "Key management for multicast: Issues and architectures," IETF (1999) RFC 2627.
[13] Jiang, Q., Manivannan, D., "Routing protocols for sensor networks," CCNC (2004) 93 - 98.
[14] Al-Karaki, J.N., Kamal, A.E., "Routing techniques in wireless sensor networks: a survey," Wireless Communications Vol. 11 (2004).
[15] Chien-Chung Su, Ko-Ming Chang, Yau-Hwang Kuo, Mong-Fong Horng, "The new Intrusion Prevention and Detection Approaches for Clustering-based Sensor Network," WCNC (2005) 1927-1932.
[16] Zhu, S., Setia, S., Jajodia, S., "LEAP: efficient security mechanisms for large-scale distributed sensor networks," ACM CCS (2003) 27-31.
[17] Wong, C., Gouda, M., Lam, S., "Secure group communications using key graphs," IEEE/ACM Transactions on Networking 8 (2000) 16-30.
[18] Nils J. Nilsson., "Artificial Intelligence: A new synthesis," Morgan Kaufmann Publishers (1998).
[19] Lin, C., Gerla, M., "Adaptive clustering for mobile wireless networks," Journal on Selected Areas of Communication Vol.15 (1997).
[20] Younis, M., Youssef, M., Arisha K., "Energy-Aware Routing in Cluster-Based Sensor Networks," MASCTS (2002) 129-136.