Key establishment protocols for secure communication in clustered sensor networks

  • Authors:
  • A. S. Poornima;B. B. Amberker

  • Affiliations:
  • Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur-572103, Karnataka, India;Department of Computer Science and Engineering, National Institute of Technology, Warangal, Andhra Pradesh, India

  • Venue:
  • International Journal of Communication Networks and Distributed Systems
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Clustering in wireless sensor networks WSN is a technique used to improve the lifetime of the network. Heinzelman et al. proposed a clustering method called LEACH which rotates the role of CH among the nodes in the network. However, it does not provide any security. In this paper, we propose two deterministic key establishment protocols to counter the vulnerabilities of LEACH protocol. These protocols are called polynomial-based key establishment protocol PBKEP and hash-based key establishment protocol HBKEP. These protocols ensure that it is always possible to establish a secret key with the current CH in every round of LEACH clustering protocol. The protocols also ensure that a malicious node cannot join the cluster at any round. The clusters are formed only among the legitimate nodes. Also any malicious node pretending as CH will not succeed as no other legitimate node will choose that as CH.