A Hash Chains Based Key Management Scheme for Wireless Sensor Networks | SpringerLink
Skip to main content

A Hash Chains Based Key Management Scheme for Wireless Sensor Networks

  • Conference paper
Cyberspace Safety and Security (CSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7672))

Included in the following conference series:

Abstract

High secure connectivity and invulnerability are two important goals of wireless sensor networks. However, many existing key management schemes for wireless sensor networks cannot achieve the two goals simultaneously. To solve the problem, the paper proposed a key management scheme based on hash chains and auxiliary nodes. In the scheme, adjacent sensor nodes can establish shared session keys with high probabilities; besides, the validity of chain keys including their identifiers can be distinguished by hash functions. Analyses show that the scheme not only can achieve the two goals to secure wireless sensor networks, but also can has advantages in terms of storage, communication overhead, and computation overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Devi, S.A., Babu, R.V., Rao, B.S.: A New Approach for Evolution of End to End Security in Wireless Sensor Network. International J. Computer Science and Engineering 3(6), 2531–2543 (2011)

    Google Scholar 

  2. Kum, J.M., Cho, J.S., Jung, S.M., Chung, T.M.: An Energy-Efficient Dynamic Key Management in Wireless Sensor Networks. In: 9th International Conference on Advanced Communication Technology, pp. 214–2153. IEEE Press, Gangwon-Do (2007)

    Google Scholar 

  3. Adrian, P., John, S., David, W.: Security in Wireless Sensor Networks. Communications of the ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  4. Wang, Y., Attebury, G., Ramamurthy, B.: A Survey of Security Issues in Wireless Sensor Networks. IEEE Communications Survey & Tutorials 8(2), 2–23 (2006)

    Article  Google Scholar 

  5. Barati, A., Dehghan, M., Barati, H., Mazreah, A.A.: Key Management Mechanisms in Wireless Sensor Networks. In: Second International Conference on Sensor Technologies and Applications, pp. 81–86. IEEE Press, Cap Esterel (2008)

    Google Scholar 

  6. Eschnauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM Press, New York (2002)

    Google Scholar 

  7. Chan, H., Perrig, A., Song, D.: Random Key Pre-Distribution Schemes for Sensor Networks. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Press, Berkeley (2003)

    Google Scholar 

  8. Hwang, D.D., Lai, B.-C.C., Verbauwhede, I.: Energy-Memory-Security Tradeoffs in Distributed Sensor Networks. In: Nikolaidis, I., Barbeau, M., An, H.-C. (eds.) ADHOC-NOW 2004. LNCS, vol. 3158, pp. 70–81. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Du, W., Deng, J., Han, S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. ACM Transaction on Information and System Security 8(2), 228–258 (2003)

    Article  Google Scholar 

  10. Gong, W.C., Li, X.M.: Q-Composite Key Management Plan’s Research and Improvement. J. Electronic Measurement Technology 33(6), 115–117 (2010) (in Chinese)

    Google Scholar 

  11. Hussain, S., Rahman, M., Yang, L.: Key Pre-Distribution Scheme Using Keyed-Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks. In: IEEE Int. Conf. Pervasive Computing and Communications, pp. 1–6. IEEE Press, Los Alamitos (2009)

    Google Scholar 

  12. Qin, T., Chen, H.: An Enhanced Scheme against Node Capture Attack using Hash-Chain for Wireless Sensor Networks. J. Information Technology 11, 102–109 (2012)

    Article  Google Scholar 

  13. Subash, T.D., Divya, C.: Double Hash Function Scheme for Wireless Sensor Networks. In: World Congress on Information and Communication Technologies, pp. 88–92. IEEE Press, Mumbai (2011)

    Google Scholar 

  14. Shan, T., Liu, C.: Enhancing the Key Pre-Distribution Scheme on Wireless Sensor Networks. In: IEEE Asia-Pacific Conference on Services Computing, pp. 1127–1131. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  15. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM 2004, pp. 586–597. IEEE Press, Piscataway (2004)

    Google Scholar 

  16. Du, W., Deng, J.: A Key Pre-distribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions on Dependable and secure Computing 3(1), 62–77 (2006)

    Article  Google Scholar 

  17. Chan, A., Perrig, A.: PKIE: Peer Intermediaries for Key Establishment in Sensor Networks. In: IEEE INFOCOM 2005, pp. 524–535. IEEE Communication Society, Piscataway (2005)

    Google Scholar 

  18. Younis, M., Ghumman, K., Eltoweissy, M.: Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Trans. Parallel and Distribution System 17(8), 856–882 (2006)

    Google Scholar 

  19. Simplicio, M.A., Barreto, S.L.M., Margi, B., Carvalho, C.M.B.: A Survey on Key Management Mechanisms for Distributed Wireless Sensor Networks. Computer Networks 54(28), 2591–2612 (2010)

    Article  Google Scholar 

  20. Su, Z., Lin, C., Ren, F.Y.: A Random Key Pre-Distribution Plan Based on Hash Chain in WSN. J. Chinese Journal of Computers 32(1), 30–41 (2009) (in Chinese)

    Article  Google Scholar 

  21. Zhao, H.W., Hu, J.K., Qin, J., Varadharajan, V.: Hashed Random Key Pre-Distribution Scheme for Large Heterogeneous Sensor Networks. In: 11th IEEE International Conferencce on Trust, Security and Privacy in Computing and Communications, pp. 706–713. IEEE Press, Liverpool (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhao, H., Qin, J., Shu, M., Hu, J. (2012). A Hash Chains Based Key Management Scheme for Wireless Sensor Networks. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35362-8_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35361-1

  • Online ISBN: 978-3-642-35362-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics