Multi-Level Dynamic Key Management for Scalable Wireless Sensor Networks with UAV

نویسنده

  • Ozgur Koray Sahingoz
چکیده

Wireless Sensor Networks (WSNs) are more vulnerable to security attacks than wired networks because of their wireless and dynamic nature. In today’s WSNs, the sensor nodes act not only as routers but also as communication endpoints, and they are also responsible for the security of the messages. Therefore, it is important to define whether an incoming message originates from a trustworthy node or not. The main solution for this is the usage of cryptographically signed messages. There are two main classifications for signing messages: namely symmetric and asymmetric algorithm based cryptography. In the asymmetric key cryptography, public/private key pairs are used to encrypt and decrypt messages. However, it can cause severe computational, memory, and energy overhead for the nodes. On the other side, symmetric key cryptography is superior to asymmetric key cryptography in terms of speed and low energy cost, but at the same time, it needs to design an efficient and flexible key distribution schemes for improving system performance. In this paper, it is aimed to set a multi-level dynamic key management system for WSNs with the aid of an Unmanned Aerial Vehicle (UAV) as a key distribution and coordination center for asymmetric keys. Public keys of the sensor nodes are dispatched by UAVs and symmetric keys set with these key combinations. Evaluation results show the proposed system is scalable, and its performance is considerably better than single asymmetric key management systems

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Target Tracking Based on Virtual Grid in Wireless Sensor Networks

One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017