HIKES: Hierarchical key establishment scheme for wireless sensor networks

被引:11
作者
Ibriq, J. [1 ]
Mahgoub, I. [2 ]
机构
[1] Dickinson State Univ, Dept Math & Comp Sci, Dickinson, ND 58601 USA
[2] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
关键词
key management; security; wireless sensor networks; authenticated broadcast; partial key escrow; AUTHENTICATION; INFORMATION;
D O I
10.1002/dac.2438
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a hierarchical key establishment scheme called HIKES. The base station in this scheme, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities authenticating, on its behalf, the cluster members and issuing private keys. HIKES uses a partial key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes secret key issuance and reduces the communication cost with the base station. HIKES provides an efficient broadcast authentication in which source authentication is achieved in a single transmission and a good defense for the routing mechanism. HIKES defends the routing mechanism against most known attacks and is robust against node compromise. HIKES also provides high addressing flexibility and network connectivity to all sensors in the network, allowing sensor addition and deletion. Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1825 / 1856
页数:32
相关论文
共 55 条
[1]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]  
[Anonymous], 2003, MPR MOT PROC RAD BOA
[3]  
[Anonymous], 2002, P 9 ACM C COMPUT COM, DOI DOI 10.1145/586110.586117
[4]  
[Anonymous], 2006, P 10 IEEE INT C COMM
[5]  
[Anonymous], 2000, 00010 TR NAI LABS SE
[6]  
[Anonymous], 2003, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, DOI [10.1145/986858.986869, DOI 10.1145/986858.986869]
[7]  
Azimian K, 2010, INT J NETWORK SECURI, V10, P153
[8]  
Bellare Mihir., 1997, P 4 ACM C COMPUTER C, P78, DOI DOI 10.1145/266420.266439
[9]   FULLY-FLEDGED 2-WAY PUBLIC-KEY AUTHENTICATION AND KEY AGREEMENT FOR LOW-COST TERMINALS [J].
BELLER, MJ ;
YACOBI, Y .
ELECTRONICS LETTERS, 1993, 29 (11) :999-1001
[10]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335