An efficient collusion resistant security mechanism for heterogeneous sensor networks

نویسندگان

  • Sajid Hussain
  • Firdous Kausar
  • Ashraf Masood
  • Jong Hyuk Park
چکیده

Purpose Random key pre-distribution schemes are vulnerable to collusion attacks. The purpose of this research is to propose an efficient collusion resistant security mechanism for heterogeneous sensor networks (HSN). As large-scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the HSNs are preferred because they provide better performance and security solutions for scalable applications in dynamic environments. Design/methodology/approach We consider an heterogeneous sensor networks (HSN) consist of a small number of powerful high-end H-sensors and a large number of ordinary low-end L-sensors. However, homogeneous sensor networks (MSN) consists of only L-sensors. Since the collusion attack on key pre-distribution scheme mainly takes advantage of the globally applicable keys, which are selected from the same key pool, we update the key ring after initial deployment and generate new key rings by using one-way hash function on nodes’ IDs and initial key rings. Further, in the proposed scheme, every node is authenticated by the BS in order to join the network. Findings The analysis of the proposed scheme shows that even if a large number of nodes are compromised, an adversary can only exploit a small number of keys near the compromised nodes, while other keys in the network remain safe. Originality/value The proposed key management scheme outperforms the previous random key pre-distribution schemes by: a) considerably reducing the storage requirement, b) providing more resiliency against node capture and collusion attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Internet Research

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2009