Key Management Scheme for Sensor Networks with Proactive Key Revocation and Sleep State Consideration

  • Authors:
  • Rabia Riaz;Ali Hammad Akbar;Mustafa Hasan;Ki-Hyung Kim;Kyungsuk Lhee;Ayesha Naureen;Attiya Akram;H. Farooq Ahmed

  • Affiliations:
  • AJOU University, Suwon, S. Korea;AJOU University, Suwon, S. Korea;AJOU University, Suwon, S. Korea;AJOU University, Suwon, S. Korea;AJOU University, Suwon, S. Korea;NUST, Rawalpindi, Pakistan;NUST, Rawalpindi, Pakistan;Communication Technologies, Sendai, Japan

  • Venue:
  • NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In Dynamic key management systems, while frequent control messaging may be necessary for robustness of security, it is detrimental to energy resources of wireless sensor networks. The problem is further exacerbated for sleep enabled sensor networks as a) malicious nodes penetrate into a network by spoofing the ids of legitimate nodes that are in sleeping state b) it is possible for legitimate sensor nodes to be entirely compromised. In this paper, the abovementioned aspects of keying are addressed as tierce to optimize communication. First a secure key generation mechanism is presented that aims at optimizing communication. Second, a sleep schedule cognizant protocol is presented to prevent id spoofing of sleeping nodes. Third, a post attack mechanism is proposed to prevent the compromised nodes to join the network. Our threesome solution not only saves energy by minimizing the communication overhead in establishing keys among sensor nodes but also provides high but secure connectivity for sleep state nodes.