15-02-2013, 04:44 PM
A New Security Scheme for Wireless Sensor Networks
A New Security Scheme.pdf (Size: 127.98 KB / Downloads: 49)
Abstract—
Wireless Sensor Networks (WSN) are ad-hoc mobile
networks in which the sensors have limited resources and communication
capabilities. Secure communications in some wireless
sensor networks are critical. Recently, several secure schemes
for wireless sensor networks have been proposed. Localized
combinatorial keying (LOCK) proposed by Mohamed Eltoweissy
is secure wireless sensor network scheme based on the dynamical
key management. In this paper, we present a new wireless
sensor network security scheme. Our scheme is based on LOCK
scheme and employees ID-based secure group key management.
Our scheme have several advantages over the existing LOCK
scheme. This scheme improves the wireless sensor network system
security. It minimizes the number of key storage requirement
and the number of the communication messages for rekeying.
In addition, one unique advantage is that it does not affect any
other nodes when evicting compromised node or moving the node
from one location to another.
INTRODUCTION
Wireless Sensor Networks (WSNs) are the wireless networks
that comprise of a large number of spatially distributed
small autonomous devices cooperatively monitoring environmental
conditions and sending the collected data to a command
center using wireless channels. Wireless sensor network has
some unique characteristics such as large scale of deployment,
mobility of nodes, node failures, communication failures and
dynamic network topology. In addition, each sensor node has
constraints on resource such as energy, memory, computation
speed and bandwidth because of the constraints on size and
cost.
Wireless sensor networks have many applications in both
military and civilian such as battlefield surveillance, habitat
monitoring, healthcare, traffic control etc. Many applications
of the WSN require secure communications. However, wireless
networks are prone to different types of malicious attacks
because of the wireless connectivity, the absence of the physical
protection and the unattended deployment etc.. Therefore,
the security in sensor network is extremely important.
However, the characteristics of the wireless sensor network
make incorporating security very challenge. The constraints
on sensor make the design and operation exceedingly different
from the contemporary wireless networks. The existing
security mechanisms for the wire-line and wireless networks
can not apply to the wireless sensor network because of
the constrained energy, memory and computation capability.
Thus, resource conscious security protocols and management
techniques become necessary for WSN environment.
Key management protocols are the core of the secure
communications. Recently, many dynamic key management
schemes for the wireless sensor network have been proposed.
Dynamic key management schemes are used in the longlived
networks and emphasize rekeying to achieve resilience to
attack. In these schemes, the administrative keys are changed
periodically or on demand. These dynamic schemes have
scalability to support adding new nodes and evicting compromised
nodes. Gaurav Jolly et al. [1] proposed a dynamic key
management scheme based on ID-based symmetric keying. In
this scheme, the network includes a base station and a number
of clusters of sensor nodes led by gateways. The base station
generates and assigns keys and the gateways distribute keys.
This scheme uses affordable storage while the rekeying is not
efficient as it needs a large number of message exchanges for
rekeying. To balance the number of keys employed for each
node and the number of messages for rekeying, Mohamed
Eltoweissy et al. [2] proposed an efficient rekeying solution
called exclusion-based systems (EBSs). Then they developed
the first EBS-based secure wireless sensor network scheme [3].
The shortage of this scheme is that it does not address the
collusion problem. To address this problem, Mohamed F.
Younis et al. [4] developed another EBS-based scheme called
SHELL. This scheme has the similar network model with
Joly’s scheme while SHELL uses the EBS framework to
perform the rekeying within the cluster. This scheme is based
on a centralized key server to perform rekeying. Mohamed
Eltoweissy et al. [5] proposed another EBS-base scheme called
LOCK which employs two layer EBS to perform localized
rekeying to minimize overhead.