A unified security framework with three key management schemes for wireless sensor networks

AJOU University, School of Information and Communication, Wonchundong, Yongtonggu, 443-749 Suwon, Gyunggi, South Korea
Computer Communications (Impact Factor: 1.7). 12/2008; 31(18):4269-4280. DOI: 10.1016/j.comcom.2008.05.043
Source: DBLP


Pervasive computing environments find their practical manifestations through wireless sensor networks, which sense a relationship amongst themselves and the environment. Currently the proposed keying schemes for ensuring security, in wireless sensor networks, may be classified into public and private keying schemes, or their hybrid. However, an investigation in peer work underpins the fact that neither of these works relates the key management schemes with the granularity of key generation, distribution, renewal, and revocation. In this paper, we propose a unified security framework with three key management schemes, SACK, SACK-P, and SACK-H that incorporate symmetric key cryptography, asymmetric key cryptography and the hybrid, respectively. We have evaluated the key management schemes against a broad range of metrics such as energy, resource utilization, scalability and resilience to node compromises. Our evaluation comprises both analytical investigation and experimental validation. The results show that though SACK-P is heavy on resources, it provides maximal security and offers the best resilience to node compromises. On the contrary, SACK is very efficient in terms of storage and communication. Our results substantiate a relationship between the level of security and resource utilization and form a design benchmark for security frameworks.

Download full-text


Available from: Ali Hammad Akbar, Nov 25, 2014
  • Source
    • "Network security is a critical issues in wireless sensor networks as it significantly affects the efficiency of the communication and many key management schemes and fault diagnosis had been proposed to mitigate this constraint (Zarifzadeh, Nayyeri, & Yazdan, 2008), and (Riaz, et al., (2008), (Wang, Zhou, Liu, & Wu, 2012). In an event of accident ( ) occurring, the routing path would be affected by (1   ) where  is any random value within β, that would cause explosion on r  matrix and result in "
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper a Glial Ratio (g-ratio) mix hybrids of 67% Sigmoid and 33% Radial functions (HSCR-BF gr) based on Particle swarm optimisation with the highest survivability of all possible routing redundancies, reliability, efficiency, fault tolerant with minimum fitness error is proposed for underground rescue operation. Nonlinear weights of cosine and sine were imposed on the g-ratio hybrids. In addition we introduced a nonlinear weight with the g-ratio on the Gaussian RBF. The performance of the Hybrid with negative cosine weight (HSCR-BF -grcos) was the best among the various g-ratio hybrids as compared to Gaussian with the same nonlinear weight. The hybrid with negative nonlinear cosine weight yielded the best results with an optimised error of 0.011. The proposed Nonlinear Hybrid Algorithm has better capability of approximation to underlying functions with a fast learning speed, high scalability, robusticity and is competitive to the Gaussian with the same nonlinear weight.
    Full-text · Article · Oct 2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: IEEE 802.15.4 standard for low power wireless personal area networks (LoWPANs) is emerging as a promising technology to bring envisioned ubiquitous paragon, into realization. Considerable efforts are being carried on to integrate LoWPANs with other wired and wireless IP networks, in order to make use of pervasive nature and existing infrastructure associated with IP technologies. Designing a security solution becomes a challenging task as this involves threats from wireless domain of resource constrained devices as well as from extremely mature IP domain. In this paper we have i) identified security threats and requirements for LoWPANs ii) analyzed current security solutions and identified their shortcomings, iii) proposed a generic security framework that can be modified according to application requirements to provide desired level of security. We have also given example implementation scenario of our proposed framework for resource and security critical applications.
    No preview · Conference Paper · Apr 2009
  • Source

    Preview · Chapter · Dec 2010
Show more