An efficient secure key establishment method in cluster-based sensor network

被引:7
作者
Singh, Akansha [1 ]
Jain, Khushboo [2 ]
机构
[1] Noida Inst Engn & Technol, Greater Noida, India
[2] DIT Univ, Dehra Dun, Uttarakhand, India
关键词
Cluster-based sensor networks; Communication cost; Key storage; Hash function; Secure key establishment method; Wireless sensor networks; AUTHENTICATION SCHEME; AGREEMENT;
D O I
10.1007/s11235-021-00844-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The main issue for the security of wireless sensor networks (WSNs) is how to allow sensor nodes (SNs) to establish and share cryptographic keys in an energy-efficient, storage-efficient, and authentic manner for their secure data transmission. Furthermost recent studies carried out in this direction is concerned with homogeneous networks in which all sensor has identical characteristics and fundamental administration mechanisms. However, Cluster-based sensor networks have demonstrated better achievements and performance than homogeneous networks because of the several benefits of clustering. This inspired us to propose a secure key-establishment method for cluster-based sensor networks based on symmetric-key cryptography. Since symmetric key cryptography has small energy consumption, they are a great choice to prefer for securing the networks. Even though symmetric key cryptography has high storage needs, this deficiency can be reduced by using suitable methods-evaluating the proposed work that the storage needs are reduced along with reduced energy consumption. The work offers a favorable level of security against various intruders and possible security threats and is additionally scalable than the state-of-the-art techniques.
引用
收藏
页码:3 / 16
页数:14
相关论文
共 50 条
[41]   HierTrack:an energy-efficient cluster-based target tracking system for wireless sensor networks [J].
Zhi-bo WANG ;
Zhi WANG ;
Hong-long CHEN ;
Jian-feng LI ;
Hong-bin LI ;
Jie SHEN .
Frontiers of Information Technology & Electronic Engineering, 2013, (06) :395-406
[42]   The Performance Optimization of Energy-Efficient Scheduling Algorithm for Cluster-Based Wireless Sensor Networks [J].
Wang, Hsing-Wen ;
Chen, Pin-Jui .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02) :361-370
[43]   The Performance Optimization of Energy-Efficient Scheduling Algorithm for Cluster-based Wireless Sensor Networks [J].
Wang, Hsing-Wen ;
Chen, Pin-Jui .
PROCEEDINGS OF THE 11TH EAI INTERNATIONAL CONFERENCE ON HETEROGENEOUS NETWORKING FOR QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS, 2015, :365-369
[44]   HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks [J].
Zhi-bo Wang ;
Zhi Wang ;
Hong-long Chen ;
Jian-feng Li ;
Hong-bin Li ;
Jie Shen .
Journal of Zhejiang University SCIENCE C, 2013, 14 :395-406
[45]   A Cluster-Based Energy-Efficient Routing Protocol without Location Information for Sensor Networks [J].
Lee, Giljae ;
Kong, Jonguk ;
Lee, Minsun ;
Byeon, Okhwan .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2005, 1 (01) :49-54
[46]   A Cluster-Based Framework for the Security of Medical Sensor Environments [J].
Klaoudatou, Eleni ;
Konstantinou, Elisavet ;
Kambourakis, Georgios ;
Gritzalis, Stefanos .
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 :52-62
[47]   AN EFFICIENT SESSION KEY MANAGEMENT SCHEME FOR CLUSTER BASED WIRELESS SENSOR NETWORKS [J].
Patel, Vaishali ;
Gheewala, Jaydeep .
2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, :963-967
[48]   Dual-Tier Cluster-Based Routing in Mobile Wireless Sensor Network for IoT Application [J].
Al-Sadoon, Maha Ebrahim ;
Jedidi, Ahmed ;
Al-Raweshidy, Hamed .
IEEE ACCESS, 2023, 11 :4079-4094
[49]   CSDA: a novel cluster-based secure data aggregation scheme for WSNs [J].
Fang, Wei ;
Wen, XueZhi ;
Xu, Jiang ;
Zhu, JieZhong .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3) :S5233-S5244
[50]   A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach [J].
Ari, Ado Adamou Abba ;
Yenke, Blaise Omer ;
Labraoui, Nabila ;
Damakoa, Irepran ;
Gueroui, Abdelhak .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 69 :77-97