Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

Sushmita Ruj, Kouchui Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

We propose a key management scheme for two-tire hierarchical mobile network using triple key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public key techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple key distribution technique. The cluster heads are powerful and use asymmetric key distribution techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first key management scheme which uses both symmetric and asymmetric triple key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.

Original languageEnglish
Title of host publication2013 IEEE Global Communications Conference, GLOBECOM 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages402-407
Number of pages6
ISBN (Print)9781479913534
DOIs
Publication statusPublished - Jan 1 2013
Event2013 IEEE Global Communications Conference, GLOBECOM 2013 - Atlanta, GA, United States
Duration: Dec 9 2013Dec 13 2013

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other2013 IEEE Global Communications Conference, GLOBECOM 2013
CountryUnited States
CityAtlanta, GA
Period12/9/1312/13/13

Fingerprint

Wireless sensor networks
Sensor nodes
Tires
Base stations
Wireless networks
Network protocols

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

Ruj, S., & Sakurai, K. (2013). Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique. In 2013 IEEE Global Communications Conference, GLOBECOM 2013 (pp. 402-407). [6831104] (GLOBECOM - IEEE Global Telecommunications Conference). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/GLOCOM.2013.6831104

Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique. / Ruj, Sushmita; Sakurai, Kouchui.

2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., 2013. p. 402-407 6831104 (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ruj, S & Sakurai, K 2013, Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique. in 2013 IEEE Global Communications Conference, GLOBECOM 2013., 6831104, GLOBECOM - IEEE Global Telecommunications Conference, Institute of Electrical and Electronics Engineers Inc., pp. 402-407, 2013 IEEE Global Communications Conference, GLOBECOM 2013, Atlanta, GA, United States, 12/9/13. https://doi.org/10.1109/GLOCOM.2013.6831104
Ruj S, Sakurai K. Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique. In 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc. 2013. p. 402-407. 6831104. (GLOBECOM - IEEE Global Telecommunications Conference). https://doi.org/10.1109/GLOCOM.2013.6831104
Ruj, Sushmita ; Sakurai, Kouchui. / Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique. 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., 2013. pp. 402-407 (GLOBECOM - IEEE Global Telecommunications Conference).
@inproceedings{3f6abfb68b04446793c7c5954bdd4dbb,
title = "Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique",
abstract = "We propose a key management scheme for two-tire hierarchical mobile network using triple key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public key techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple key distribution technique. The cluster heads are powerful and use asymmetric key distribution techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first key management scheme which uses both symmetric and asymmetric triple key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.",
author = "Sushmita Ruj and Kouchui Sakurai",
year = "2013",
month = "1",
day = "1",
doi = "10.1109/GLOCOM.2013.6831104",
language = "English",
isbn = "9781479913534",
series = "GLOBECOM - IEEE Global Telecommunications Conference",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "402--407",
booktitle = "2013 IEEE Global Communications Conference, GLOBECOM 2013",
address = "United States",

}

TY - GEN

T1 - Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

AU - Ruj, Sushmita

AU - Sakurai, Kouchui

PY - 2013/1/1

Y1 - 2013/1/1

N2 - We propose a key management scheme for two-tire hierarchical mobile network using triple key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public key techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple key distribution technique. The cluster heads are powerful and use asymmetric key distribution techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first key management scheme which uses both symmetric and asymmetric triple key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.

AB - We propose a key management scheme for two-tire hierarchical mobile network using triple key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public key techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple key distribution technique. The cluster heads are powerful and use asymmetric key distribution techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first key management scheme which uses both symmetric and asymmetric triple key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.

UR - http://www.scopus.com/inward/record.url?scp=84904116422&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84904116422&partnerID=8YFLogxK

U2 - 10.1109/GLOCOM.2013.6831104

DO - 10.1109/GLOCOM.2013.6831104

M3 - Conference contribution

AN - SCOPUS:84904116422

SN - 9781479913534

T3 - GLOBECOM - IEEE Global Telecommunications Conference

SP - 402

EP - 407

BT - 2013 IEEE Global Communications Conference, GLOBECOM 2013

PB - Institute of Electrical and Electronics Engineers Inc.

ER -