Abstract

Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless networks are not suitable for WSNs. In this paper, we propose a mechanism to assure information security against security attacks and particularly node capturing attacks. We propose a cluster security management protocol, called Cryptographic Checksum Clustering Security Management (C3SM), to provide an efficient decentralized security management for hierarchal networks. In C3SM, every cluster selects dynamically and alternately a node as a cluster security manager (CSM) which distributes a periodic shared secrete key for all nodes in the cluster. The cluster head, then, authenticates identity of the nodes and derive a unique pairwise key for each node in the cluster. C3SM provides sufficient security regardless how many nodes are compromised, and achieves high connectivity with low memory cost and low energy consumption. Compared to existing protocols, our protocol provides stronger resilience against node capture with lower key storage overhead.

Highlights

  • Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of Wireless Sensor Networks (WSNs), security mechanisms used in wired networks and other types of wireless networks are not suitable for WSNs

  • We propose a cluster security management protocol, called Cryptographic Checksum Clustering Security Management (C3SM), to provide an efficient decentralized security management for hierarchal networks

  • Wireless Sensor Networks (WSNs) are highly distributed and self-organized system that is based on collaborative effort of a large number of nodes, where each node has the ability of sensing, computation, and communication

Read more

Summary

Introduction

Wireless Sensor Networks (WSNs) are highly distributed and self-organized system that is based on collaborative effort of a large number of nodes, where each node has the ability of sensing, computation, and communication. An enemy can listen to the wireless communication and intercept the traffic To prevent such malicious attacks, secret keys should be used to encrypt wireless communication and establish data confidentiality, integrity and authentication among sensor nodes. An enemy can capture a sensor node and access its data and communication keys This type of attacks is called node capture attack, and forms a main challenge to develop a security mechanism for WSNs. In wired and wireless networks, information assurance is attained by data encryption and authentication. Dynamic, periodic and unique pairwise key for each path between the CH and sensor node These key properties make the security in WSNs stronger, and attain high connectivity with low memory cost and low energy consumption.

Related Work
System Architecture
Key Setup Phase
Clustering Security Management
Malicious Attack and Threat Model
Performance Evaluation
Communication and Computation Overhead
Key Storage Overhead
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call