Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks | SpringerLink
Skip to main content

Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks

  • Conference paper
Contemporary Computing (IC3 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 40))

Included in the following conference series:

Abstract

Cluster based organization is widely used to achieve energy efficiency in Wireless Sensor Networks(WSN). In order to achieve confidentiality of the sensed data it is necessary to have secret key shared between a node and its cluster head. Key management is challenging as the cluster head changes in every round in cluster based organization. In this paper we are proposing deterministic key establishment protocols, which ensures that always there exists a secret key between node and its cluster head. The proposed protocols establishes key in an efficient manner every time a cluster head is changed. The hash based protocol achieves key establishment with very minimal storage at each node and by performing simple computations like one way hash functions and EX-OR operations. Where as the polynomial-based protocol establishes key in every round by using preloaded information without performing any additional communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bandyopadhyay, S., Coyle, E.: An energy efficient hierarchical clustering algorithm for wireless sensor networks. In: 22 nd Conference of the IEEE Communication Society, INFOCOM, vol. 3 (2003)

    Google Scholar 

  2. Younis, O., Fahmy, S.: Distributed clustering in adhoc sensor networks: a hybrid, energy-efficient approach. In: 23rd Conference of the TEEE Computers and Communication Societies, pp. 629–640 (2004)

    Google Scholar 

  3. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference Computer and Communications security, November 2002, pp. 41–47 (2002)

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random key pre distribution schemes for sensor networks. In: IEEE symposium on Research in Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  5. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computers and Communication Security (CCS 2003), pp. 52–61 (2003)

    Google Scholar 

  6. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conference of Computers and Communication Security (CCS 2003), pp. 42–51 (2003)

    Google Scholar 

  7. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks. In: Proc. of 10th ACM Conference on Computers and Communication Security (CCS 2003) (2003)

    Google Scholar 

  8. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure Communication in Ad Hoc Networks: A Probabilistic approach. In: 11th IEEE International conference on Network Protocols (ICNP 2003) (2003)

    Google Scholar 

  9. Pietro, R.D., Mancini, L.V., Mei, A.: Random Key assignment to secure wireless sensor networks. In: 1st ACM workshop on Security of Ad Hoc and Sensor Networks (2003)

    Google Scholar 

  10. Hwang, J., Kim, Y.: Revisiting random key pre distribution schemes for WSN. In: Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43–52 (2004)

    Google Scholar 

  11. Cheng, Y., Agrawal, D.P.: Efficient pairwise key establishment and management in static wireless sensor networks. In: Second IEEE International Conference on Mobile ad hoc and Sensor Systems (2005)

    Google Scholar 

  12. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient Communication protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conference on System Sciences, January 2000, pp. 4–5 (2000)

    Google Scholar 

  13. Bohge, M., Trappe, W.: An authentication framework for hierarchical ad hoc sensor networks. In: 2003 ACM workshop on Wireless Security, pp. 79–87 (2003)

    Google Scholar 

  14. Oliveira, L.B., Wong, H.C., Loureiro, A.A.F.: Lha=sp: Secure protocols for hierarchical wireless sensor networks. In: 9th IFIP/IEEE International Symposium on Integrated Network Management (IM 2005), pp. 31–44 (2005)

    Google Scholar 

  15. Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.F.: On the security of cluster-based communication protocols for wireless sensor networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: SecLeach: A random key distribution solution for securing clustered sensor networks. In: 5th IEEE International symposium on network computing and applications, pp. 145–154 (2006)

    Google Scholar 

  17. N.F.P.180-1. Secure hash standard. Draft, NIST (May 1994)

    Google Scholar 

  18. Rivest, R.: The MD5 message-digest algorithm. RFC 1321 (April 1992)

    Google Scholar 

  19. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poornima, A.S., Amberker, B.B. (2009). Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks. In: Ranka, S., et al. Contemporary Computing. IC3 2009. Communications in Computer and Information Science, vol 40. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03547-0_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03547-0_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03546-3

  • Online ISBN: 978-3-642-03547-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics