CFP last date
20 December 2024
Reseach Article

An Efficient and Novel Key Establishment Scheme for Internet Enabled Wireless Sensor Network in the Context of IOT

by Karthikeyan.m, J.selvakumar, Amal Twinkle Mathew
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 15
Year of Publication: 2015
Authors: Karthikeyan.m, J.selvakumar, Amal Twinkle Mathew
10.5120/20057-2038

Karthikeyan.m, J.selvakumar, Amal Twinkle Mathew . An Efficient and Novel Key Establishment Scheme for Internet Enabled Wireless Sensor Network in the Context of IOT. International Journal of Computer Applications. 114, 15 ( March 2015), 35-39. DOI=10.5120/20057-2038

@article{ 10.5120/20057-2038,
author = { Karthikeyan.m, J.selvakumar, Amal Twinkle Mathew },
title = { An Efficient and Novel Key Establishment Scheme for Internet Enabled Wireless Sensor Network in the Context of IOT },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 15 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number15/20057-2038/ },
doi = { 10.5120/20057-2038 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:53:23.979081+05:30
%A Karthikeyan.m
%A J.selvakumar
%A Amal Twinkle Mathew
%T An Efficient and Novel Key Establishment Scheme for Internet Enabled Wireless Sensor Network in the Context of IOT
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 15
%P 35-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSN) behave as a digital skin, providing a virtual layer where the information about the physical world can be accessed by any computational system. As a result, they are an invaluable resource for realizing the vision of the Internet of Things (IoT). Many applications of sensor networks require secure communication. Thus establishing a secure channel between any two sensor-nodes in WSNs/IESNs is important for many applications, such as secure data exchange, secure data aggregation, and secure routing. In this paper, first we show why existing three party key establishment schemes cannot be easily applied to IESN. Second we propose an extension of traditional three-party key establishment schemes (such as SNEP, BBF and OR). The method provides DoS and Sybil attack resistance and benefits from low communication cost, independence of prior sensor deployment knowledge and support for node mobility. In comparison to the previous well-known three-party schemes, our extension not only fixes DoS vulnerability, but also provides some other advantages such as significant efficiency. The proposed key establishment scheme can be used not only for establishing shared key between any two sensors, but it is applicable for establishing shared secret between any two entities/ things in the context of IoT.

References
  1. Radoi, I. E. , Shenoy, A. , & Arvind, D. K. (2012, June). Evaluation of routing protocols for internet-enabled wireless sensor networks. In ICWMC 2012, The Eighth International Conference on Wireless and Mobile Communications (pp. 56-61).
  2. G. Montenegro, N. Kushalnagar, J. Hui, D. Culler. RFC 4944: Transmission of IPv6 Packets over IEEE 802. 15. 4 Networks. 2007.
  3. IPSO Alliance, http://www. ipso-alliance. org/, [April 2012].
  4. T. Yang, M. Ikeda, G. DeMarco, and L. Barolli, "Performance Behavior of AODV, DSR and DSDV Protocols for Different Radio Models in Ad-Hoc Sensor Networks", in Proc. Int. Conf on Parallel Processing Workshops, Sept. 2007.
  5. K. J. Wong and D. K. Arvind, "SpeckMAC: low-power decentralised MAC protocols for low data rate transmissions in specknets. " Proceedings of the 2nd international workshop on Multihop ad hoc networks from theory to reality. ACM, 2006. 71-78.
  6. P. Levis, N. Lee, M. Welsh, and D. Culler, "TOSSIM: Accurate and scalable simulation of entire TinyOS applications,", 1st Int. Conf. On Embedded Networked Sensor Systems. ACM, 2003, pp. 126 – 137.
  7. Z. Shelby, K. Hartke, and B. Frank, "Constrained Application Protocol (CoAP) draft-ietf-core-coap-08", Nov. 1, 2011.
  8. Ibriq, J. , & Mahgoub, I. (2014). HIKES: Hierarchical key establishment scheme for wireless sensor networks. International Journal of Communication Systems,27(10), 1825-1856.
  9. Newell, A. , Yao, H. , Ryker, A. , Ho, T. , & Nita-Rotaru, C. (2014). Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. ACM Computing Surveys (CSUR), 47(2), 24.
  10. Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. Spins: security protocols for sensor networks. Wirel Netw 2002;8(5):521–34.
  11. Bauer RK, Berson TA, Feiertag RJ. A key distribution scheme using event markets. ACM Trans Comput Syst 1983;1(3):249–55.
  12. Lasla, N. , Derhab, A. , Ouadjaout, A. , Bagaa, M. , & Challal, Y. (2014). SMART: Secure Multi-pAths Routing for wireless sensor neTworks. In Ad-hoc, Mobile, and Wireless Networks (pp. 332-345). Springer International Publishing.
  13. Khan, S. U. , Lavagno, L. , Pastrone, C. , & Spirito, M. A. (2014). Online Authentication and Key Establishment Scheme for Heterogeneous Sensor Networks. International Journal of Distributed Sensor Networks, 2014.
  14. Roy, S. , & Das, A. K. (2014). Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network. In Security in Computing and Communications (pp. 20-29). Springer Berlin Heidelberg.
  15. Luk, M. , Mezzour, G. , Perrig, A. , & Gligor, V. (2007, April). MiniSec: a secure sensor network communication architecture. In Proceedings of the 6th international conference on Information processing in sensor networks (pp. 479-488). ACM.
  16. Ge, M. , & Choo, K. K. R. (2014). A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks (pp. 462-475). Springer International Publishing.
  17. Chan, H. , Gligor, V. D. , Perrig, A. , Muralidharan, G. : On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Transactions on Dependable and Secure Computing 2(3), 233–247 (2005)
  18. Liu, X. , & Zhao, Q. (2015, January). Cluster Key Scheme Based on Bilinear Pairing for Wireless Sensor Networks. In Proceedings of the 4th International Conference on Computer Engineering and Networks (pp. 299-304). Springer International Publishing.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things (IoT) Wireless sensor network (WSN) Key establishment Internet Protocol for Smart Objects.