Abstract

Wireless sensor networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. Due to the sensitive nature of the data transmitted by these applications, appropriate protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links. In this paper, we propose a novel group key management scheme called DynTunKey (dynamic tunneling and group key management protocol). This paper investigates the use of secure tunnels as a solution to improve the protection of WSNs. We propose a tunneling scheme that conforms to the security requirements of WSNs while having less computational and network overhead. We also propose a solution for a dynamic integration in the secured communication of a newly deployed sensor. A set of experiments has been conducted to assess the performance of the proposed scheme with regard to recent key management protocol and to traditional tunnels built using the IPSec protocol. We found that our protocol considerably reduces the number of transmitted messages as well as the computational load, which makes it suitable for WSNs. We tested the proposed protocol considering two models of mobility of the targets which are respectively the Random Walk model and the Gauss Markov model.

Highlights

  • The progress of sensing and communication technologies has motivated the proliferation of wireless sensor networks (WSNs)

  • We propose in this paper a distributed and dynamic tunnel and group key management protocol for WSNs called DynTunKey

  • We introduce a tunneling approach that takes into account the Bellazreg and Boudriga EURASIP Journal on Wireless Communications and Networking 2014, 2014:9 http://jwcn.eurasipjournals.com/content/2014/1/9 characteristics of the cryptographic algorithms that are typically used for WSNs

Read more

Summary

Introduction

The progress of sensing and communication technologies has motivated the proliferation of wireless sensor networks (WSNs). If a sensor needs to send data to a group of nodes, it has to do it in a separate manner for each sensor Another category of the key generation solutions is the centralized key management schemes. At the end of those exchanges, we have two major results Those messages authenticate the core node and the sensors and only the trust nodes will participate in the establishment of the secure channels. After those exchanges, the nodes have shared a secret group key that will be used in further communications and sessions. When receiving the INIT message, the sensor S4 does not send a response, but the other sensors exchange all the messages and complete all the steps from step 1 to step 5 to establish the group key

Cluster SA negotiation exchanges
Time-dependent integration of a newly deployed sensor
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.