A hierarchical key management and authentication method for wireless sensor networks

被引:26
作者
Alimoradi, Pourya [1 ]
Barati, Ali [1 ]
Barati, Hamid [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Dezful Branch, Dezful, Iran
关键词
authentication; cryptography; key management; security; wireless sensor network; SECURITY; EFFICIENT; ATTACKS;
D O I
10.1002/dac.5076
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra-zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter-zone key is shared between both of the manager nodes and is used for inter-zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor & Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat & Dave, 2021) methods show the proposed method's better performance.
引用
收藏
页数:16
相关论文
共 46 条
[1]   Secure Path Key Establishment Schemes Based on Random Key Management for WSN [J].
Ahlawat, Priyanka ;
Dave, Mayank .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES INDIA SECTION A-PHYSICAL SCIENCES, 2021, 91 (03) :555-567
[2]   Key-management scheme for wireless sensor networks based on merging blocks of symmetric design [J].
Anzani, Mohaddese ;
Javadi, Hamid Haj Seyyed ;
Modirir, Vahid .
WIRELESS NETWORKS, 2018, 24 (08) :2867-2879
[3]  
Apsara MB, 2020, ENG TECHNOL APPL SCI, V10, P5108
[4]  
Arumugam V., 2021, INT J APPL SCI ENG, V18, P1
[5]   EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs [J].
Athmani, Samir ;
Bilami, Azeddine ;
Boubiche, Djallel Eddine .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 :789-799
[6]   ISFC-BLS (Intelligent and Secured Fuzzy Clustering Algorithm Using Balanced Load Sub-Cluster Formation) in WSN Environment [J].
Bhushan, Bharat ;
Sahoo, Gadadhar .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (03) :1667-1694
[7]  
Bhushan B, 2019, WIREL NETW, V25, P2697, DOI 10.1007/s11276-019-01988-7
[8]   Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks [J].
Bhushan, Bharat ;
Sahoo, Gadadhar .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (02) :2037-2077
[9]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[10]   Reinforcement Learning-Based Genetic Algorithm in Optimizing Multidimensional Data Discretization Scheme [J].
Chen, Qiong ;
Huang, Mengxing ;
Xu, Qiannan ;
Wang, Hao ;
Wang, Jinghui .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020