We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network

by Jyothi Metan, K N Narasimha Murthy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 12
Year of Publication: 2015
Authors: Jyothi Metan, K N Narasimha Murthy
10.5120/20605-3225

Jyothi Metan, K N Narasimha Murthy . Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network. International Journal of Computer Applications. 117, 12 ( May 2015), 9-15. DOI=10.5120/20605-3225

@article{ 10.5120/20605-3225,
author = { Jyothi Metan, K N Narasimha Murthy },
title = { Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 12 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number12/20605-3225/ },
doi = { 10.5120/20605-3225 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:11.957490+05:30
%A Jyothi Metan
%A K N Narasimha Murthy
%T Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 12
%P 9-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the recent times the concept of group key management is found to be one of the very essential issues in the field of wireless sensor network. Because of the dual impact limitations and various operations in open and hash environment the security and confidentiality which are considered as very challenging issues in WSN. The main issues which are associated with securing the sensor network have more complexity when the group communication of the network is considered. This paper addresses the security issues associated with the Group key management techniques and ensures some significant conclusions for group key management in cluster tree WSNs. A group is defined as a set of sensor nodes present in cluster based tree network and shares some sensory information such as temperature, pressure, etc. The main objective of the paper is to highlights some of the significant issues which are associated with the authentication of the group key data exclusively for the members who have a secure access to the group information. This study contributes an overview of secure an efficient group management mechanisms for cluster tree networks and in between group members. In order to focus on the various issues and limitations a comparative analysis of various key management techniques have been done and evaluated. The schemes are allowed to maintain multiple groups and rekey desperately. This paper focuses on the various group key management issues that outperforms conventional techniques of group key management.

References
  1. Ameen, A. , and Kwak, K. S. 2011. Social Issues in wireless sensor networks with healthcare perspective. Int. Arab J. Inf. Techno, Vol. 8(1), pp. 52-58
  2. Sen, J. 2012. Security in wireless sensor networks. Wireless Sensor Networks: Current Status and Future Trends, Khan, pp. 407-460
  3. J-H. S and S-W. S. 2015. Group Key Managements in Wireless Sensor Networks. www. intechopen. com
  4. Younis, M. , Ghumman, K. , Eltoweissy, M. 2006. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. Parallel and Distributed Systems, IEEE Transactions, Vol. 17, No. 8, pp. 865-882
  5. Yu, M. , Mokhtar, H. , Merabti, M . 2007. Fault management in wireless sensor networks. Wireless Communications, IEEE, Vol. 14, No. 6, pp. 13-19
  6. Alagheband, M. R. , Aref, M. R. 2012. Dynamic and secure key management model for hierarchical heterogeneous sensor networks. Information Security, IET, Vol. 6, No. 4, pp. 271-280
  7. Barachi, M. , Kadiwal, A. , Glitho, R. , Khendek, F. , Dssouli, R. 2010. The design and implementation of architectural components for the integration of the IP multimedia subsystem and wireless sensor networks. Communications Magazine, IEEE, Vol. 48, No. 4, pp. 42-50
  8. Erol-Kantarci, M. , Mouftah, H. T. 2011. Wireless Sensor Networks for Cost-Efficient Residential Energy Management in the Smart Grid. Smart Grid, IEEE Transactions, Vol. 2, No. 2, pp. 314-325
  9. Anderson, R. , Haowen, C. , Perrig, A. 2004. Key Infection: Smart Trust for Smart Dust, 20 in: 12th IEEE International Conference on Network Protocols (ICNP), Berlin, Germany, 206–215
  10. da Cunha, A. B. , da Silva, D. C. 2012. Behavioral Model of Alkaline Batteries for Wireless Sensor Networks. Latin America Transactions, IEEE (Revista IEEE America Latina), Vol. 10, No. 1, pp. 1295-1304
  11. Ren, K. , Lou, W. , Zhang, Y. 2008. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. Mobile Computing, IEEE Transactions, Vol. 7, No. 5, pp. 585-598
  12. Yetgin, H. , Cheung, K. T. K. , El-Hajjar, M. , Hanzo, L. 2014. Cross-layer network lifetime optimization considering transmit and signal processing power wireless sensor networks. Wireless Sensor Systems, IET , Vol. 4, No. 4, pp. 176-182
  13. Qian, Y. , Lu, K. , Tipper, D. 2007. A design for secure and survivable wireless sensor networks. Wireless Communications, IEEE , Vol. 14, No. 5, pp. 30-37
  14. Yang, S. , Yang, X. , McCann, J. A. , Zhang; T. , Liu, G. , Liu, Z. 2013. Distributed Networking in Autonomic Solar Powered Wireless Sensor Networks. Selected Areas in Communications, IEEE Journal, Vol. 31, No. 12, pp. 750-761
  15. Wang; L. , Xu, L. D. , Bi, Z. , Xu, Y. 2014. Data Cleaning for RFID and WSN Integration. Industrial Informatics, IEEE Transactions, Vol. 10, No. 1, pp. 408-418
  16. Bechkit, W. , Challal, Y. , Bouabdallah, A. , Tarokh, V. 2013. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. Wireless Communications, IEEE Transactions, Vol. 12, No. 2, pp. 948-959
  17. Ruj, S. , Nayak, A. , Stojmenovic, I. 2013. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications. Computers, IEEE Transactions, Vol. 62, No. 11, pp. 2224-2237
  18. Ma, U. , Lou, W. , Li, X-Y. 2014. Contiguous Link Scheduling for Data Aggregation in Wireless Sensor Networks. Parallel and Distributed Systems, IEEE Transactions, Vol. 25, No. 7, pp. 1691-1701
  19. Gu, W. , Dutta, N. , Chellappan, S. , Bai, X. 2011. Providing End-to-End Secure Communications in Wireless Sensor Networks, Network and Service Management, IEEE Transactions, Vol. 8, No. 3, pp. 205-218
  20. Seo, S-H. , Won, J. , Sultana, S. , Bertino, E. 2015. Effective Key Management in Dynamic Wireless Sensor Networks. Information Forensics and Security, IEEE Transactions, Vol. 10, No. 2, pp. 371-383
  21. Klaoudatou, E. , Konstantinou, E. , Kambourakis, G. , Gritzalis, S. 2011. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs. Communications Surveys & Tutorials, IEEE, Vol. 13, No. 3, pp. 429-442
  22. Yu, C-M. , Lu, C-S. , Kuo, S-Y. 2010. Noninteractive Pairwise Key Establishment for Sensor Networks. Information Forensics and Security, IEEE Transactions, Vol. 5, No. 3, pp. 556-569
  23. Dong; W. , Chen, C. , Liu, X. , Bu, J. 2010. Providing OS Support for Wireless Sensor Networks: Challenges and Approaches. Communications Surveys & Tutorials, IEEE , Vol. 12, No. 4, pp. 519-530
  24. Wang; L. , Xu, L. D. , Bi, Z. , Xu, Y. 2014. Data Cleaning for RFID and WSN Integration. Industrial Informatics, IEEE Transactions , Vol. 10, No. 1, pp. 408-418
  25. Ruiz, L. B. , Nogueira, J. M. , Loureiro, A. A. F. 2003. MANNA: a management architecture for wireless sensor networks. Communications Magazine, IEEE , Vol. 41, No. 2, pp. 116-125
  26. Camtepe, S. A. , Yener, B. 2007. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. Networking, IEEE/ACM Transactions, Vol. 15, No. 2, pp. 346-358
  27. Poornima, A. S. , Amberker, B. B. 2011. Secure data collection using mobile data collector in clustered wireless sensor networks. Wireless Sensor Systems, IET , Vol. 1, No. 2, pp. 85-95
Index Terms

Computer Science
Information Sciences

Keywords

Secure group management Group communication Wireless sensor networks (WSNs) Security.