We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

New Framework for Enhanced Secure Key Management in Hierarchical Wireless Sensor Network

by Avant Panwar, Manoj Kumar, Sajendra Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 8
Year of Publication: 2013
Authors: Avant Panwar, Manoj Kumar, Sajendra Kumar
10.5120/12762-9730

Avant Panwar, Manoj Kumar, Sajendra Kumar . New Framework for Enhanced Secure Key Management in Hierarchical Wireless Sensor Network. International Journal of Computer Applications. 73, 8 ( July 2013), 24-29. DOI=10.5120/12762-9730

@article{ 10.5120/12762-9730,
author = { Avant Panwar, Manoj Kumar, Sajendra Kumar },
title = { New Framework for Enhanced Secure Key Management in Hierarchical Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 8 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number8/12762-9730/ },
doi = { 10.5120/12762-9730 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:32.522521+05:30
%A Avant Panwar
%A Manoj Kumar
%A Sajendra Kumar
%T New Framework for Enhanced Secure Key Management in Hierarchical Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 8
%P 24-29
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The salient features of WSN like use of wireless radio communication, collaborative nature and deployment in the open environment exposes it to many security threats. Since WSN has tight limitations on the power consumption, transmission and computation the complex cryptographic algorithms can't be used to provide the security. Key management in WSN is the fundamental line of defense for a secure communication and thus it is very important. In this paper we propose a new framework for enhanced key management for hierarchical WSN which enhances the security of the network. In the proposed framework the base station computes all the keys required for both inter and intra cluster communications. Cluster is further isolated into small geographical areas on the basis of hop count from the cluster head. The sensor nodes in the network join the cluster on the basis of the distance (hop counts) from the cluster head which localizes the path key things and reduces the overhead. The proposed framework is divided into four stages pre key distribution, pair wise key establishment, computing the path key and re keying all the keys.

References
  1. L. Eschenauer, V_D. Gligor, A key management scheme for distributed sensor networks. In: Proceedings of the Ninth ACM conference on Computer and communication secuirty (CCS '02. ), pp. 41-47,2002.
  2. H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proceedings of the IEEE Symposium on Security And Privacy, pp. 197–213, 2003
  3. S Zhu, S Setiaand S Jajodia "LEAP: efficient security mechanisms for large-scale distributed sensor networks" in the proceeding of 10th ACM conference on Computer and communication security(CCS'03),pp. 62-72,2003.
  4. S. Banihashemian and A. G. Bafghi, "A new key management scheme in heterogeneous wireless sensor networks," in Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT '10), pp. 141–146, February 2010.
  5. Y. Y. Zhang, X. Z. Li, J. P. Cao, L. K. Zeng, Y. Zhen and D. Q Gao "Distance-Based Key Management in Hierarchical Wireless Sensor Network" in the proceeding of Automatic Control and Artificial Intelligence (ACAI 2012), International Conference on Digital Object Identifier, pp. 915 – 918,2012
  6. Yiying Zhang,,Xiangzhen Li, Jianming Liu, Jucheng Yang, and Baojiang Cui "A Secure Hierarchical KeyManagement Scheme in Wireless Sensor Network" International Journal of Distributed Sensor Networks,Volume 2012 ,pp 1-8, 2012.
  7. X. Du, Y. Xiao, M. Guizani, and H. H. Chen, "An effective key management scheme for heterogeneous sensor networks," Ad Hoc Networks, vol. 5, no. 1, pp. 24–34, 2007.
  8. AbdoulayeDiop, Yue Qi, Qin Wang, and ShariqHussain "An Efficient and Secure Key Management Scheme for Hierarchical Wireless Sensor Networks" International Journal of Computer and Communication Engineering, Vol. 1, No. 4, November 2012,pp 365-370,2012.
  9. Heinzelman,WendiRabiner,AnanthaChandrakasan and HariBalakrishnan"Energy-efficient communication protocol for wireless sensor networks" In System Sciences,2000. Proceedings of the 33rd Annual Hawaii International Conference on IEEE,pp 10-pp,2000.
  10. Manjeshwar and D. P. Agrawal, "TEEN: a protocol for enhanced efficiency in wireless sensor networks," in Proceedings of the 15th international workshop on parallel and distributed computing issues in wireless networks and mobile computing, pp. 2009–2015, 2001.
  11. S. Zhu, S. Setia, and S. Jajodia, "LEAP+: efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500–528, 2006.
  12. Martins,David and HerveGuyennet"Wireless sensor network attacks and security mechanism:a short survey". IN the Proceedings of 13th International Conference on Network –Based Information System(NBiS),pp. 313-320. IEEEE,2010 [For security analysis].
  13. H. N. Seyed, H. J. Amir, and D. Vanesa, "A distributed group rekeying scheme for wireless sensor networks," in ProceedingsofThe 6th International Conference on Systems and NetworksCommunications (ICSNC '11), pp. 127–135, 2011.
  14. Anjum and Farooq" Location dependenet key management in sensor network without using deployment knowledge" in Wireless Networks 16,no. 6(2010),pp. 1587-1600,2010.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network security key management hop count and cluster