Title :
An efficient and scalable key management mechanism for Wireless Sensor Networks
Author :
Abdallah, Walid ; Boudriga, Noureddine ; Daehee Kim ; Sunshin An
Author_Institution :
Commun. Networks & Security Res. Lab., Univ. of Carthage, Tunis, Tunisia
Abstract :
A major issue in many applications of Wireless Sensor Networks (WSNs) is ensuring security. Particularly, in military applications, sensors are usually deployed in hostile areas where they can be easily captured and operated by an adversary. Most of security attacks in WSNs are due to the lack of security guaranties in terms of authentication, integrity, and confidentiality. These services are often provided using cryptographic primitives where sensor nodes need to agree on a set of secret keys. Current key distribution schemes are not fully adapted to the tiny, low-cost, and fragile nature of sensors that are equipped with limited computation capability, reduced memory size, and battery-based power supply. This paper investigates the design of an efficient key distribution and management scheme for wireless sensor networks. The proposed scheme can ensure the generation and distribution of different encryption keys intended to secure individual and group communications. This is performed based on elliptic curve public key encryption using Diffie-Hellman like key exchange that is applied at different levels of the network topology. In addition, a re-keying procedure is performed using secret sharing techniques. This scheme is more efficient and less complex than existing approaches, due to the reduced number of messages and the less processing overhead required to accomplish key exchange. Furthermore, few number of encryption keys with reduced sizes are managed in sensor nodes, which optimizes memory usage and enhances scalability to large size networks.
Keywords :
public key cryptography; telecommunication network topology; telecommunication security; wireless sensor networks; Diffie-Hellman like key exchange; WSN; computation capability; cryptographic primitives; current key distribution schemes; elliptic curve public key encryption; group communications; military applications; network topology; rekeying procedure; scalable key management mechanism; secret keys; secret sharing techniques; secure individual; security attacks; wireless sensor networks; Base stations; Elliptic curves; Encryption; Sensors; Wireless sensor networks; Elliptic curve cryptography; Key distribution and management; Security; Wireless sensor networks; threshold secret sharing;
Conference_Titel :
Advanced Communication Technology (ICACT), 2015 17th International Conference on
Conference_Location :
Seoul
Print_ISBN :
978-8-9968-6504-9
DOI :
10.1109/ICACT.2015.7224913