• DocumentCode
    1018535
  • Title

    Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks

  • Author

    Younis, Mohamed F. ; Ghumman, Kajaldeep ; Eltoweissy, Mohamed

  • Author_Institution
    Dept. of Comput. Sci. & Electr. Eng., Maryland Univ., Baltimore, MD
  • Volume
    17
  • Issue
    8
  • fYear
    2006
  • Firstpage
    865
  • Lastpage
    882
  • Abstract
    Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive settings such as battlefield surveillance, border control, and infrastructure protection. Data confidentiality and authenticity are critical in these settings. However, the wireless connectivity, the absence of physical protection, the close interaction between WSNs and their physical environment, and the unattended deployment of WSNs make them highly vulnerable to node capture as well as a wide range of network-level attacks. Moreover, the constrained energy, memory, and computational capabilities of the employed sensor nodes limit the adoption of security solutions designed for wire-line and wireless networks. In this paper, we focus on the management of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem. Our scheme is termed SHELL because it is scalable, hierarchical, efficient, location-aware, and light-weight. Unlike most existing key management schemes for WSNs, SHELL supports rekeying and, thus, enhances network security and survivability against node capture. SHELL distributes key management functionality among multiple nodes and minimizes the memory and energy consumption through trading off the number of keys and rekeying messages. In addition, SHELL employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes by factoring the geographic location of nodes in key assignment. Simulation results demonstrate that SHELL significantly boosts the network resilience to attacks while conservatively consuming nodes´ resources
  • Keywords
    protocols; public key cryptography; telecommunication security; wireless sensor networks; EBS; SHELL; WSN; clustered sensor networks; combinatorial key management scheme; distributed key management scheme; encryption key management; energy consumption; exclusion basis systems; location-aware protocols; network level attack; network security; wireless sensor networks; Computer networks; Cryptography; Energy consumption; Energy management; Large-scale systems; Memory management; Protection; Resilience; Surveillance; Wireless sensor networks; Wireless sensor networks; collusion attacks.; combinatorial optimization; energy efficient design; exclusion basis systems; key management; location-aware protocols; secure group communications;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2006.106
  • Filename
    1652948