Fast Hierarchical Key Management Scheme With Transitory Master Key for Wireless Sensor Networks

被引:15
|
作者
Gandino, Filippo [1 ]
Ferrero, Renato [1 ]
Montrucchio, Bartolomeo [1 ]
Rebaudengo, Maurizio [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
来源
IEEE INTERNET OF THINGS JOURNAL | 2016年 / 3卷 / 06期
关键词
Key management; symmetric encryption; transitory master key (MK); wireless sensor network (WSN); INTRUSION; MAC;
D O I
10.1109/JIOT.2016.2599641
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Symmetric encryption is the most widely adopted security solution for wireless sensor networks. The main open issue in this context is represented by the establishment of symmetric keys. Although many key management schemes have been proposed in order to guarantee a high security level, a solution without weaknesses does not yet exist. An important class of key management schemes is based on a transitory master key (MK). In this approach, a global secret is used during the initialization phase to generate pair-wise keys, and it is deleted during the working phase. However, if an adversary compromises a node before the deletion of the MK, the security of the whole network is compromised. In this paper, a new key negotiation routine is proposed. The new routine is integrated with a well-known key computation mechanism based on a transitory master secret. The goal of the proposed approach is to reduce the time required for the initialization phase, thus reducing the probability that the master secret is compromised. This goal is achieved by splitting the initialization phase in hierarchical subphases with an increasing level of security. An experimental analysis demonstrates that the proposed scheme provides a significant reduction in the time required before deleting the transitory secret material, thus increasing the overall security level. Moreover, the proposed scheme allows to add new nodes after the first deployment with a suited routine able to complete the key establishment in the same time as for the initial deployment.
引用
收藏
页码:1334 / 1345
页数:12
相关论文
共 50 条
  • [1] Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks
    Celozzi, Cesare
    Gandino, Filippo
    Rebaudengo, Maurizio
    2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013), 2013, : 151 - 157
  • [2] A Key Management Scheme Based on Hierarchical Wireless Sensor Networks
    Yu, Meisheng
    Miao, Yueqin
    Yu, Jing
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 42 - 49
  • [3] An Efficient Key Management Scheme in Hierarchical Wireless Sensor Networks
    Zhang, Xinyang
    Wang, Jidong
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [4] A practical study of transitory master key establishment for wireless sensor networks
    Deng, J
    Hartung, C
    Han, R
    Mishra, S
    First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 289 - 299
  • [5] A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks
    Chen, Chien-Ming
    Zheng, Xinying
    Wu, Tsu-Yang
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [6] A hierarchical key establishment scheme for wireless sensor networks
    Ibriq, Jamil
    Mahgoub, Imad
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS, PROCEEDINGS, 2007, : 210 - +
  • [7] Key Management Scheme for Wireless Sensor Networks
    Wang, Yongjian
    Zhao, Jing
    WIRELESS INTERNET (WICON 2017), 2018, 230 : 272 - 283
  • [8] EPKM:An Efficient and Practical Key Management Scheme for Hierarchical Wireless Sensor Networks
    Yang Wei
    Qi Yue
    Luo Xinqiang
    Wang Qin
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 697 - 700
  • [9] A Bezier Curve Based Key Management Scheme for Hierarchical Wireless Sensor Networks
    Shen, Yong-Luo
    Zhang, Jun
    Yang, Di-Wei
    Luo, Lin-Bo
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2979 - +
  • [10] A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks
    Messai, Mohamed-Lamine
    Seba, Hamida
    Aliouat, Makhlouf
    WIRED/WIRELESS INTERNET COMMUNICATIONS, WWIC 2015, 2015, 9071 : 411 - 424