The Optimum Design of Location-Dependent Key Management Protocol for a Multiple Sink WSN Using a Random Selected Cell Reporter

被引:9
作者
Fakhrey, Harith [1 ,2 ]
Johnston, Martin [3 ]
Angelini, Federico [3 ]
Tiwari, Rajesh [3 ]
机构
[1] Univ Baghdad, Baghdad 10071, Iraq
[2] Newcastle Univ, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
[3] Newcastle Univ, Sch Engn, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
Multiple sink wireless sensor network (WSN); multiple base stations; revocation schemes; border surveillance; smart cities; location-dependent key management system; optimization; end-to-end security; WIRELESS SENSOR NETWORKS; INJECTED FALSE DATA; SECURITY; INTERNET; SCHEME;
D O I
10.1109/JSEN.2018.2871661
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of wireless sensor networks for the purposes of border surveillance is a very hot topic at the moment. Such a network comprises large numbers of' sensor nodes, sparsely located over a wide terrain, where the generated data are collected by multiple sinks located in secure head quarters. Due to its importance and criticality, data disseminated through such a network is vulnerable to outsider attacks. Therefore, a location-dependent key management scheme could be employed in order to provide security in terms of confidentiality and authenticity. This paper presents a novel location-dependent key management protocol for multiple sinks (LKMP-MS) whose design is based on a cell reporters scheme. In this protocol, the generated report regarding any event contains three security levels. In particular, the third level is implemented as an endorsement of the set of cell reporters allocated inside each cell. Accordingly, the generated event report is accepted by the sink. As a result, the adversary would have to compromise all endorsement nodes and all cell reporters selected by all sinks in order to generate a fake report inside a particular spot. This paper introduces a novel algorithm to implement the required revocation for both compromised nodes and cells in order to overcome the possible consequences of these entities being compromised. In order to evaluate and compare the LKMP-MS with recent schemes, a mathematical analysis is implemented and a simulation environment is built based on Contiki and MATLAB to validate the mathematical analyses. Finally, an extensive mathematical analysis is presented in order to calculate the optimum number of cell reporters that gives the highest level of security.
引用
收藏
页码:10163 / 10173
页数:11
相关论文
共 37 条
[1]  
Acitores M., 2010, R IND EFFORTS ENHANC
[2]  
AFP, 2016, US FUND TUN BORD SUR
[3]   Mobility Aware Framework for Timeslotted Channel Hopping IEEE 802.15.4e Sensor Networks [J].
Al-Nidawi, Yaarob ;
Kemp, Andrew H. .
IEEE SENSORS JOURNAL, 2015, 15 (12) :7112-7125
[4]   Security of industrial sensor network-based remote substations in the context of the Internet of Things [J].
Alcaraz, Cristina ;
Roman, Rodrigo ;
Najera, Pablo ;
Lopez, Javier .
AD HOC NETWORKS, 2013, 11 (03) :1091-1104
[5]  
[Anonymous], 2015, SENSORS J IEEE
[6]  
Archibold R. C., 2007, 28 MILE VIRTUAL FENC
[7]  
Archibold R. C., PRIVACY IMPACT ASSES
[8]  
Baird T, 2016, SURVEILL SOC, V14, P34
[9]   Complete monotonicity and logarithmically complete monotonicity properties for the gamma and psi functions [J].
Chen, Chao-Ping .
JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS, 2007, 336 (02) :812-822
[10]  
Dandekar DR, 2013, IEEE INT ADV COMPUT, P408