Implementation of Effective Key Management Strategy with Secure Data Aggregation in Dynamic Wireless Sensor Network

Authors

  • Shraddha Deshmukh  M.Tech Scholar, Department of Computer Technology, Yeshwantrao Chavan College of Engineering, Nagpur, Maharashtra, India
  • Prof. A. R. Bhagat Patil  Dean(P&D) & Associate Professor, Department of Computer Technology, Yeshwantrao Chavan College of Engineering, Nagpur, Maharashtra, India
  • Harshad Nakade  Wolters Kluwer Pvt. Ltd., Pune, Maharashtra, India

Keywords:

Wireless Sensor Networks (WSN), Clustering, Relay cluster heads (RCH), Key Generation Centers (KGC), Elliptical Curve Cryptography (ECC), Certificateless Partial Key Generation.

Abstract

Wireless sensor networks (WSNs) have been passed on for a wide assortment of uses, including military detecting and following, understanding status observing, activity flow checking, where sensory contraptions as often as possible move between various territories. Securing data and correspondences requires reasonable encryption key conventions. In this paper, we propose a Certificateless-effective key management (CL-EKM) convention for secure correspondence in unique WSNs portrayed by hub versatility. The CL-EKM underpins capable key updates when a hub leaves or joins a cluster and guarantees forward and in reverse key mystery. The convention additionally underpins efficient key renouncement for exchanged off nodes and limits the impact of a hub exchange off on the security of other correspondence joins. A security examination of our arrangement exhibits that our convention is effective in guarding against various assaults. It is effective in time, vitality, correspondence, and memory execution. Likewise, we actualize Data gathering hub for correspondence inside cluster head and base station. The DCN is valuable when the cluster head is bargained hub and information sending without separation.

References

  1. H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. IEEE Symp. SP, May 2003, pp. 197–213.
  2. W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A key predistribution scheme for sensor networks using deployment knowledge,” IEEE Trans. Dependable Secure Comput., vol. 3, no. 1, pp. 62–77, Jan./Mar. 2006.
  3. M. R. Alagheband and M. R. Aref, “Dynamic and secure key management model for hierarchical heterogeneous sensor networks,” IET Inf. Secur., vol. 6, no. 4, pp. 271–280, Dec. 2012.
  4. W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005.
  5. I.-H. Chuang, W.-T. Su, C.-Y. Wu, J.-P. Hsu, and Y.-H. Kuo, “Two layered dynamic key management in mobile and long-lived clusterbased wireless sensor networks,” in Proc. IEEE WCNC, Mar. 2007, pp. 4145–4150.
  6. S. Agrawal, R. Roman, M. L. Das, A. Mathuria, and J. Lopez, “A novel key update protocol in mobile sensor networks,” in Proc. 8th Int. Conf. ICISS, vol. 7671. 2012, pp. 194–207.
  7. S. Seo and E. Bertino, “Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing,” CERIAS, West Lafayette, IN, USA, Tech.
  8. S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito, “An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks,” in Proc. 6th Int. Conf. CRiSIS, Sep. 2011, pp. 1–8.
  9. S. H. Seo, J. Won, and E. Bertino, “POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures,” in Proc. 4th ACM CODASPY, 2014, pp. 143–146.
  10. Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, “Fast authenticated key establishment protocols for self-organizing sensor networks,” in Proc. 2nd ACM Int. Conf. WSNA, 2003, pp. 141–150.
  11. M. Rahman and K. El-Khatib, “Private key agreement and secure communication for heterogeneous sensor networks,” J. Parallel Distrib. Comput., vol. 70, no. 8, pp. 858–870, 2010.
  12. D. S. Sanchez and H. Baldus, “A deterministic pairwise key predistribution scheme for mobile sensor networks,” in Proc. 1st Int. Conf. SecureComm, Sep. 2005, pp. 277–288.
  13. X. Zhang, J. He, and Q. Wei, “EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks,” EURASIP J. Wireless Commun. Netw., vol. 2011, pp. 1–11, Jan. 2011.
  14. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proc. 6th Int. Workshop Cryptograph. Hardw. Embedded Syst., 2004, pp. 119–132.
  15. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Proc. 9th Int. Conf. ASIACRYPT, vol. 2894. 2013, pp. 452–473.
  16. Rep. CERIAS TR 2013-10, 2013. [Online]. Available: https://www.cerias.purdue.edu/apps/reports_and_papers/.Seung-Hyun
  17. X.-J. Lin and L. Sun, “Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks,” in Proc. IACR Cryptol. ePrint Archive, 2013, pp. 698–698.
  18. P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, “NanoECC: Testing the limits of elliptic curve cryptography in sensor networks,” in Proc. 5th Eur. Conf. WSN, vol. 4913. 2008, pp. 305–320.
  19. K. Chatterjee, A. De, and D. Gupta, “An improved ID-based key management scheme in wireless sensor network,” in Proc. 3rd Int. Conf. ICSI, vol. 7332. 2012, pp. 351–359.
  20. W. T. Zhu, J. Zhou, R. H. Deng, and F. Bao, “Detecting node replication attacks in mobile sensor networks: Theory and approaches,” Secur. Commun. Netw., vol. 5, no. 5, pp. 496–507, 2012.
  21. M. A. Rassam, M. A. Maarof, and A. Zainal, “A survey of intrusion detection schemes in wireless sensor networks,” Amer. J. Appl. Sci., vol. 9, no. 10, pp. 1636–1652, 2012.
  22. P. Jiang, “A new method for node fault detection in wireless sensor networks,” Sensors, vol. 9, no. 2, pp. 1282–1294, 2009.
  23. L. Paradis and Q. Han, “A survey of fault management in wireless sensor networks,” J. Netw. Syst. Manage., vol. 15, no. 2, pp. 171–190, 2007.
  24. (2013). All About Battery. [Online]. Available: http://www.allaboutbatteries.com/Energy-tables. html, accessed Dec. 2014.
  25. A. Liu and P. Ning, “TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks,” in Proc. Int. Conf. IPSN, Apr. 2008, pp. 245–256.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Shraddha Deshmukh, Prof. A. R. Bhagat Patil, Harshad Nakade, " Implementation of Effective Key Management Strategy with Secure Data Aggregation in Dynamic Wireless Sensor Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.358-364, March-April-2018.