We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks

by Kamaljit Singh, Lalit Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 4
Year of Publication: 2013
Authors: Kamaljit Singh, Lalit Sharma
10.5120/10457-5166

Kamaljit Singh, Lalit Sharma . Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks. International Journal of Computer Applications. 63, 4 ( February 2013), 43-49. DOI=10.5120/10457-5166

@article{ 10.5120/10457-5166,
author = { Kamaljit Singh, Lalit Sharma },
title = { Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 4 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 43-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number4/10457-5166/ },
doi = { 10.5120/10457-5166 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:08.557492+05:30
%A Kamaljit Singh
%A Lalit Sharma
%T Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 4
%P 43-49
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wireless sensor networks (WSNs), data transmission is secured by authenticating secret keys. Secure key management is most important for network reliability and consistency. In this paper, a hierarchical group key management technique using threshold cryptography in Wireless Sensor Networks is proposed. The technique considers hierarchical sensor network, where sensing nodes are coordinated by forwarding nodes (FN) and in turn they are connected to the BS which is responsible for key computation and distribution. FN estimates the group key using threshold secret sharing scheme. The acquired group key is divided into multiple shares and shared among member nodes. Thus, this reduces the possibility of key compromised. The proposed technique is simulated using network simulator 2 (NS-2). Simulation results show the proficiency of the technique.

References
  1. F. L. Lewis, "Wireless Sensor Networks", To appear in Smart Environments: Technologies, Protocols, and Applications, ed. D. J. Cook and S. K. Das, John Wiley, New York, 2004.
  2. Mansoor-uz-Zafar Dawood, Noor Zaman, Abdul Raouf Khan and Mohammad Salih, "Designing of Energy Efficient Routing Protocol for Wireless Sensor Network (WSN) Using Location Aware (LA) Algorithm", Journal of Information & Communication Technology, Vol. 3, No. 2, (Fall 2009) 56-70.
  3. S. Anandamurugan and C. Venkatesh, "Increasing the Lifetime of Wireless Sensor Networks by using AR (Aggregation Routing) Algorithm", IJCA Special Issue on "Mobile Ad-hoc Networks" MANETs, 2010.
  4. M. Sheik Dawood, S. Sadasivam and G. Athisha, "Energy Efficient Wireless Sensor Networks Based on QoS Enhanced Base Station Controlled Dynamic Clustering Protocol", International Journal of Computer Applications (0975 – 8887), Volume 13– No. 4, January 2011.
  5. Jeremy Elson and Kay Romer, "Wireless Sensor Networks: A New Regime for Time Synchronization", Proceedings of the First Workshop on Hot Topics in Networks (HotNetsI), 2829 October 2002
  6. Johnson C. Lee, Victor C. M. Leung, Kirk H. Wong, Jiannong Cao and Henry C. B. Chan, "Key Management Issues In Wireless Sensor Networks: Current Proposals and Future Developments", IEEE Wireless Communications • October 2007.
  7. Wenjun Gu, Neelanjana Dutta, Sriram Chellappan, and Xiaole Bai, "Providing End-to-End Secure Communications in Wireless Sensor Networks", IEEE Transactions on Network and Service Management, Vol. 8, No. 3, September 2011.
  8. Jia Hu, Enjian Bai and Yang Yang, "A Novel Key Management Scheme for Hierarchical Wireless Sensor Networks", Communication Technology (ICCT), 2010 12th IEEE International Conference on Date of Conference: 11-14 Nov. 2010.
  9. Shu Yun Lim and Meng-Hui Lim, "Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network", Journal of Ubiquitous Systems & Pervasive Networks Volume 2, No. 1 (2011) pp. 39-47.
  10. Tim Landstra, Sarangapani Jagannathan, and Maciej Zawodniok, "Energy-Efficient Hybrid Key Management Protocol for Wireless Sensor Networks", International Journal of Network Security, Nol. 9, No. 2, PP. 121-134, Sept. 2009.
  11. Kwang-Jin Paek, Jongwan Kim, Chong-Sun Hwang, SangKeun Lee and Ui-Sung Song, "Group-Based Key Management Protocol For Energy Efficiency In Long-Lived And Large-Scale Distributed Sensor Networks", Computing and Informatics, Vol. 27, 2008, 743–756.
  12. Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka, "A New (k, n)-Threshold Secret Sharing Scheme and Its Extension", Proceedings of the 11th international conference on Information Security, (ISC '08), pp- 455 – 470, 2008.
  13. Network Simulator: http:///www. isi. edu/nsnam/ns
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks (WSNs) Forwarding Nodes (FN) Key Management