Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

Sushmita Ruj, Kouchui Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

We propose a key management scheme for two-tire hierarchical mobile network using triple key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public key techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple key distribution technique. The cluster heads are powerful and use asymmetric key distribution techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first key management scheme which uses both symmetric and asymmetric triple key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.

Original languageEnglish
Title of host publication2013 IEEE Global Communications Conference, GLOBECOM 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages402-407
Number of pages6
ISBN (Print)9781479913534
DOIs
Publication statusPublished - 2013
Event2013 IEEE Global Communications Conference, GLOBECOM 2013 - Atlanta, GA, United States
Duration: Dec 9 2013Dec 13 2013

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other2013 IEEE Global Communications Conference, GLOBECOM 2013
Country/TerritoryUnited States
CityAtlanta, GA
Period12/9/1312/13/13

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique'. Together they form a unique fingerprint.

Cite this