Abstract
Cluster based organization is widely used to achieve energy efficiency in Wireless Sensor Networks(WSN). In order to achieve confidentiality of the sensed data it is necessary to have secret key shared between a node and its cluster head. Key management is challenging as the cluster head changes in every round in cluster based organization. In this paper we are proposing deterministic key establishment protocols, which ensures that always there exists a secret key between node and its cluster head. The proposed protocols establishes key in an efficient manner every time a cluster head is changed. The hash based protocol achieves key establishment with very minimal storage at each node and by performing simple computations like one way hash functions and EX-OR operations. Where as the polynomial-based protocol establishes key in every round by using preloaded information without performing any additional communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bandyopadhyay, S., Coyle, E.: An energy efficient hierarchical clustering algorithm for wireless sensor networks. In: 22 nd Conference of the IEEE Communication Society, INFOCOM, vol. 3 (2003)
Younis, O., Fahmy, S.: Distributed clustering in adhoc sensor networks: a hybrid, energy-efficient approach. In: 23rd Conference of the TEEE Computers and Communication Societies, pp. 629–640 (2004)
Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference Computer and Communications security, November 2002, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.: Random key pre distribution schemes for sensor networks. In: IEEE symposium on Research in Security and Privacy, pp. 197–213 (2003)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computers and Communication Security (CCS 2003), pp. 52–61 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conference of Computers and Communication Security (CCS 2003), pp. 42–51 (2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks. In: Proc. of 10th ACM Conference on Computers and Communication Security (CCS 2003) (2003)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure Communication in Ad Hoc Networks: A Probabilistic approach. In: 11th IEEE International conference on Network Protocols (ICNP 2003) (2003)
Pietro, R.D., Mancini, L.V., Mei, A.: Random Key assignment to secure wireless sensor networks. In: 1st ACM workshop on Security of Ad Hoc and Sensor Networks (2003)
Hwang, J., Kim, Y.: Revisiting random key pre distribution schemes for WSN. In: Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43–52 (2004)
Cheng, Y., Agrawal, D.P.: Efficient pairwise key establishment and management in static wireless sensor networks. In: Second IEEE International Conference on Mobile ad hoc and Sensor Systems (2005)
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient Communication protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conference on System Sciences, January 2000, pp. 4–5 (2000)
Bohge, M., Trappe, W.: An authentication framework for hierarchical ad hoc sensor networks. In: 2003 ACM workshop on Wireless Security, pp. 79–87 (2003)
Oliveira, L.B., Wong, H.C., Loureiro, A.A.F.: Lha=sp: Secure protocols for hierarchical wireless sensor networks. In: 9th IFIP/IEEE International Symposium on Integrated Network Management (IM 2005), pp. 31–44 (2005)
Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.F.: On the security of cluster-based communication protocols for wireless sensor networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005)
Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: SecLeach: A random key distribution solution for securing clustered sensor networks. In: 5th IEEE International symposium on network computing and applications, pp. 145–154 (2006)
N.F.P.180-1. Secure hash standard. Draft, NIST (May 1994)
Rivest, R.: The MD5 message-digest algorithm. RFC 1321 (April 1992)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poornima, A.S., Amberker, B.B. (2009). Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks. In: Ranka, S., et al. Contemporary Computing. IC3 2009. Communications in Computer and Information Science, vol 40. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03547-0_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-03547-0_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03546-3
Online ISBN: 978-3-642-03547-0
eBook Packages: Computer ScienceComputer Science (R0)