Please use this identifier to cite or link to this item:
A Two layers Dynamic Key Management Schemes for Cluster-Based Wireless Sensor Networks
|關鍵字:||Wireless Sensor Networks;無線感測網路;static key management;dynamic key management;cluster head;Exclusion Basis System;動態金鑰管理;靜態金鑰管理;互斥基底系統||出版社:||電機工程學系所||引用:||M. Eltoweissy, M. Moharrum. and R. Mukkamala” Dynamic key management in sensor networks”, Communications Magazine, IEEE, Vol. 44, pp. 122 - 130, 2006. H. Huang and K. Liu,” A New Dynamic Access Control in Wireless Sensor Networks”, Asia-Pacific Services Computing Conference, pp. 901 - 906, 2008. Z. Zhao, Y. Liu, H. Li and Y. Yang, “An Efficient User-to-User Authentication Scheme in Peer-to-Peer System”, First International Conference on Intelligent Networks and Intelligent Systems, pp. 263 - 266, 2008. A. S. Poornima and B. B. Amberker, “Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks”, International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009 B. Maala, H. Bettahar and A. Bouabdallah, “Performances of Key Management schemes in Wireless Sensor Networks”, World Scientific Review Volume-9.75in*6.5in, May 28, 2008 P. Mohanty, S. Panigrahi, N. Sarma and S.S. Satapathy, “A symmetric key based secured data gathering protocol for WSN”, International Conference on Anti-counterfeiting, Security, and Identification in Communication, pp. 138 - 143, 2009. C. Hsueh, Y. Li, C. Wen and Y. Quyang, “Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks”, Journal of Sensors, pp. 1251-1278, 2010 J. Zhang and V. Varadharajan, “A New Security Scheme for Wireless Sensor Networks”, Global Telecommunications Conference, pp. 1-5, 2008. S. Muhammad Khaliq-ur-Rahman Raazi, Z. Pervez and S. Lee; ” Key Management Schemes of Wireless Sensor Networks: A Survey”, Department of Computer Engineering, Kyung Hee University, Global Campus, Korea L. Li, J. Li, L. Tie and J. Pan, ”ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks”, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Vol.2, pp. 262-267, 2007. L. SHEN and X. SHI, “A Dynamic Cluster-based Key Management Protocol in Wireless Sensor Networks”, INTERNATIONAL JOURNAL OF INTELLIGENT CONTROL AND SYSTEMS, Vol. 13, No. 2, pp. 146-151, 2008, M.F. Younis, K. Ghumman, and M. Eltoweissy, ”Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 8, August 2006. J. Kim, J. Cho, S. Jung and T. Chung; “An Energy-Efficient Dynamic Key Management in Wireless Sensor Networks”, Conference on Advanced Communication Technology, The 9th International, Vol.3, pp. 2148 - 2153, 2007. J. Zhou, C. Li, Q. Cao and Y. An, ”Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network”, International Conference on Information and Automation, pp. 1547 - 1552, 2008. A. S. Poornima, B. B. Amberker and H. B. Jadhav, “An energy efficient deterministic key establishment scheme for clustered Wireless Sensor Networks”, International Conference on High Performance Computing, pp. 189 - 194, 2009. B. Bruhadeshwar, K. Kothapalli, M. Poornima and M. Divya, “Routing Protocol Security Using Symmetric Key Based Techniques”, International Conference on Availability, Reliability and Security, pp. 193 - 200, 2009 I. H. Chuang, W. T. Su, C. Y. Wu, J. P. Hsu and Y. H. Kuo, “Two-layered Dynamic Key Management in Mobile and Long-lived Cluster-based Wireless Sensor Networks”, Wireless Communications and Networking Conference, pp.4145 - 4150, 2007. T. Samuel and Jr. Redwine, “A Logic for the Exclusion Basis System”, The 37th Hawaii International Conference on System Sciences, 2004. M. Rahman, S. Sampalli and S. Hussain, “A robust pair-wise and group key management protocol for wireless sensor network”, GLOBECOM Workshops, pp. 1528 - 1532, 2010. D. Niu, Y. Y. Yao and T. T. Wang, “Improved Group-key-management Scheme for WSN”, International Colloquium on Computing, Communication, Control, and Management, Vol. 4, pp.330 - 333, 2009. N.F.P 180-1. Secure hash standard. Draft, NIST, May 1994 R.Rivest The MD5 message-digest algorithm. RFC 1321, April 1992.||摘要:||
在這篇文章中，我們將首先描述在感測網路中不同型式的攻擊，因為無線網路通常應用於軍隊的應用及無人看管的無線環境，所以在提出新的金鑰架構前，先分析攻擊型態，加強架構的安全性。動態金鑰管理方式非常適合於感測網路中，因為感測網路為了符合環境需求，網路型態經常需要予以調整至最佳狀態。所以為了配合網路節點數量的增、減，我們將採用動態金鑰管理架構，並加上我們所提出改良的互斥基底系統(The Exclusion Basis System, EBS)金鑰組預置方式，也就是集群式EBS系統，可隨時配合感測網路規模調整金鑰組設置方式及數量，用以保留感測節點中稀有的儲存空間。之後再以區域組合式金鑰方式，也就是將大型感測網路，劃分為數個叢集所組成，在以叢集基礎下，再劃分成兩個層級，也就是叢集首領與節點為一個層級，通信閘道與通信閘道為另外一個層級，分別進行金鑰認證，加強其安全性及效率。最後將探討其效能及安全性，並與其他現行金鑰架構比較，來證明我們所提出的架構可符合金鑰管理架構預期的目標。
The objective of key management is to dynamically establish and maintain secure channels among communicating nodes, so a lot of key management schemes have been proposed for sensor networks. Desired features of key management in sensor networks include energy awareness, localized impact of attacks, and scaling to a large number of nodes. A primary challenge is how to make a balance in management between providing acceptable levels of security and conserving scarce resources, in particular energy, needed for network operations.
Many schemes, key pre-distribution is used as the main principles and basic assumptions of short-term existence of a relatively static network, which is not often expended network node, and the key is to replace or shorten the life of the infrequent, referred to as static schemes. In addition the rise of a new architecture-level, known as dynamic key management scheme, a frequent assumption that the long-term existence of new network nodes in order to maintain network security and survivability, thus requiring network re-generate the key, in response to network type of change and adjustment.
In this article, we will first describe the wireless sensor networks of different types of attacks, because wireless networks are usually used in military applications and wireless unattended environment, so the new key in the proposed scheme before analysis attack patterns, strengthening the scheme for security. Dynamic key management is very suitable for sensor networks because sensor networks to comply with environmental requirements, network types often need to be adjusted to the optimum condition. So in order to meet the increasing number of network nodes, subtract, we will use dynamic key management scheme, plus an improved system of EBS (The Exclusion Basis System) preset mode key group, which is the cluster EBS systems, sensor network at any time with the key group of settings to adjust the size and number of ways to keep the node in the rare storage space. After the key combination to the regional approach is the large-scale sensor network, divided into several clusters formed in the cluster basis, and then divided into two levels, that is, a cluster head and node level, the cluster leader and communications gateway to another level, key certification, respectively, to enhance the safety and efficiency. Finally, we discuss the issues about the efficacy and safety, and with other existing key scheme for comparison, to prove that our proposed scheme can meet the key management scheme of the desired objectives.
|Appears in Collections:||電機工程學系所|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.