ISSN:2229-6093
Riddhi J Gandhi et al, Int.J.Computer Technology & Applications,Vol 7 (1),115-119
Comparative Study on Dynamic Key Management for Cluster based Sensor Networks Riddhi J Gandhi PG Scholar (SNS), SVMIT Bharuch, India
[email protected]
Abstract : This paper portrays the idea of sensor systems which has been made feasible by the meeting of micro electro mechanical systems technology, wireless communications and digital electronics. As WSNs are typically conveyed in remote, the adoption of dynamic key management is extremely important. Be that as it may, the resource constrained nature of sensor nodes impedes the utilization of dynamic key management arrangements intended for wired and ad- hoc systems. Consequently, numerous dynamic key management plans have been proposed for WSNs as of late. This paper researches the unique necessities of dynamic key management in sensor system situations, and presents a few fundamental evaluation metrics. In this work, the dynamic key management schemes are ordered into distinctive groups and outlined on the base of an evaluation metrics.
Ashish D Patel Department of IT, SVMIT Bharuch, India
[email protected]
network services and applications of WSNs. Key management can be defined as an set of procedures and systems that support key establishment and maintenance of progressing keying connections between legal parties as per a security strategy. Since sensor nodes in WSNs have requirements in their computational power and memory ability, security arrangements intended for wired and ad-hoc networks are not suitable for WSNs[2].
Keywords: Wireless sensor networks, Key management, Dynamic key management
I. INTRODUCTION A wireless sensor networks (WSN) comprises of an extensive number of sensor nodes, which are controlled by batteries, equipped with sensing, data processing and short-range radio communication components. The utilizations of WSNs extent from the most well known ones, similar to environment monitoring and home automation, to all the demanding ones in military or security regions, similar to combat zone reconnaissance, focusing on and target tracking systems. Be that as it may, the wireless connectivity, the nearby collaboration among sensor nodes and their unattended operation, and in addition the nonappearance of physical security make WSNs helpless against an extensive variety of network-level attacks and even physical damage[1,15]. Despite the fact that sensor nodes can be outfitted with inherent alter resistance systems, the memory chips are as yet suffering from different memory read-out vulnerabilities. Key management is a center system to guarantee security in
IJCTA | Jan-Feb 2016 Available
[email protected]
Fig 1. A hierarchical wireless sensor network architecture[11] The objective of key distribution in WSNs is to take care of the issue of making, appropriating and keeping up those secret keys. Thus, systems for reliable distribution and management of these keys are of indispensable significance for the security in WSNs. Because of their significance, the key management systems for WSNs have gotten expanding consideration in scientific writing, and various key administration plans have been proposed for WSNs. Depending upon the capacity to redesign the cryptographic keys of sensor nodes amid their run time (rekeying), these plans can be classified into two different classifications: static and dynamic[11]. In static key management, the guideline of key per-distribution is received, and keys are fixed for the entire lifetime of the system. However, as a
115
ISSN:2229-6093
Riddhi J Gandhi et al, Int.J.Computer Technology & Applications,Vol 7 (1),115-119
cryptographic key is utilized for quite a while, its likelihood of being assaulted increments significantly. Rather, in dynamic key management, the cryptographic keys are revived all through the system's lifetime. Dynamic key management is viewed as a promising key administration in sensor systems. Dynamic key management is a set of procedures used to perform rekeying either occasionally or on interest as required by the system. Since the keys of compromised nodes are revoked in the re keying procedure, dynamic key management mechanism improves system survivability and system resilience significantly[11,12].
II. FUNDAMENTAL NECESSITIES AND EVALUATION MEASUREMENTS[10] All key management schemes should fulfill the going with standard security necessities: confidentiality, validation, freshness, trustworthiness and non-denial. The same holds for dynamic key management. An Evaluation measurements for pre-distribution key management are named security, proficiency and adaptability, as indicated by the imperatives of sensor hubs and systems administration[].
A. Security Metrics Dynamic key management schemes must provide the cryptographic keys in a secure manner, thwarting the activities of malicious nodes inside a network. Upon detecting a compromised sensor node, the current secret key of the compromised sensor node must be revoked and a new one must be generated and distributed to its associated sensor nodes, except the compromised one. 1. Node Revocation This mechanisms are useful to prevent a compromised node from deviating the network behavior by injecting false data or modifying data of trusted nodes. 2. Forward and backward secrecy Forward secrecy is used to prevent a node from using an old key to continue decrypting new messages. Backward secrecy is the opposite, it is used to prevent a node with the new key from going backwards in time to decipher previously received messages encrypted with prior keys. Both forward and backward secrecy are used to defeat node capture attacks. 3. Collusion Resistance An adversary might attack the network and collude the nodes. A good dynamic key establishment technique must resist the collusion of newly joined and compromised nodes.
IJCTA | Jan-Feb 2016 Available
[email protected]
4. Resilience Resilience indicates the resistance against node capture, where the adversary physically attacks a sensor node and tries to recover secret information from its memory. It measures the impact of one captured node on the rest of the network. The resilience of a key management system is high if an adversary cannot affect any node except the captured one. In contrast, the resilience is low if the capture of a single node leads to the compromise of the whole network.
B. Efficiency Metrics The dynamic key distribution itself shall not put a heavy burden on the inherent resource-constrained sensor nodes in terms of: 1. Memory The amount of memory required to store security credentials, such as keys, a \user" certificate and \trusted" certificates. 2. Bandwidth The number and size of messages exchanged for the key generation process, node replenishment and node eviction. 3. Energy The energy consumption involved in the key agreement process, data transmission and reception, as well as the computational procedure for the generation and distribution of new keys.
C. Flexibility Metrics Key establishment techniques ought to be sufficiently adaptable to capacity well in the extensive variety of situations secured by WSN applications. The most important flexibility measurements are mobility, scalability and key connectivity. 1. Mobility A large portion of the network architectures accept that sensor nodes are stationary (no movement). Be that as it may, mobility of base stations or sensor nodes or both is fundamental in specific applications [10]. Thusly, the key establishment ought to have the capacity to circulate new keys to moved nodes, permitting them to speak with their new neighbors. Key era and appropriation for moving nodes is challenging, since mobility turns into an important issue, notwithstanding energy and bandwidth. 2. Scalability The quantity of sensor nodes sent in the sensing area might in the request of hundreds or even thousands. In addition, during the entire lifetime of the sensor network, nodes can join or leave. Along these lines, dynamic key management
116
ISSN:2229-6093
Riddhi J Gandhi et al, Int.J.Computer Technology & Applications,Vol 7 (1),115-119
arrangements should be adaptable to distinctive network sizes. In the interim, the security and efficiency highlights for small networks are required to be kept up when connected to large ones. 3. Key Connectivity Key connectivity is characterized as the likelihood that two nodes (or more) can establish keys subsequent to rekeying. Nearby network considers the availability between any pair of neighboring nodes. Conversely, global availability refers to the availability of the entire system. With a specific end goal to give security continuously, high key connectivity after each rekeying procedure is key.
III. LITERATURE REVIEW Abdoulaye diop et al. [1] exhibited an efficient and secure session key management scheme for cluster-based wireless sensors networks (esskm). The proposed system taking into account symmetric key instrument and gives an enhanced session key foundation by upgrading occasionally the session key within the cluster and one way hash function and message authentication code (MAC) are likewise used to give verification and message honesty; thus it stays away from different kind of attacks from malignant nodes and mitigates the node trade off attack. Huei-wen Ferng et al. [2] With the expanding size of the WSN, it is important to convey a WSN with numerous base stations. In this paper, they proposed a key management protocol for a WSN with numerous base stations to give comprehensive security over data confidentiality, authentication, integrity, and availability. An authentication is finished by neighboring nodes and base stations empower the sensor node to fabricate the neighboring data and allow base stations and sensor nodes to modify the directing data once a suspicious node is identified. The key revocation will be activated after an agreement of more than a particular number of an uncompromised neighboring nodes. At long last, the compromised node is emitted from the network. Yuying Wang et al. [3] In this paper, they proposed a key perdistribution scheme in view of numerous key spaces. The scheme also combines the benefits of BIBD and Blom. On the premise of Blom, a novel key per-distribution is proposed in this paper, hybrid BIBD is utilized to relegate key spaces to every node. By joining Blom and BIBD, this mechanism has numerous benefits. Firstly, the likelihood of key share in this scheme is enormously progressed. Besides, this scheme additionally has the security, meanwhile has great extensibility and adaptability. It supports dynamic node expansion and cancellation after beginning organization. At long last, the
IJCTA | Jan-Feb 2016 Available
[email protected]
security is enormously enhanced compared with the existing schemes. N. Renugadevi et al. [4] This paper introduces a study of three sorts of group key management in light of the association of key distribution center, for example, centralized, decentralized and distributed networks in two sorts of wireless networks, for example, MANET and WSN. Secure group communication plays a key role in the group based applications, for example, video conferencing, virtual classroom in wireless networks. Cryptographic procedures are utilized to accomplish security in the MANET and WSN. R0hit Vaid et al. [5] In this paper, they introduced another virtual area based key management scheme (VLKM). This scheme utilized virtual area to produce a round key for each sensor. The proposed scheme lessens the quantity of transmissions required for rekeying to maintain a strategic distance from stale keys. The key utilized as a part of the encryption transform progressively changes as a lingering's component virtual vitality of the sensor. Along these lines, an one-time element key is utilized for one packet just and dynamic keys are utilized for the progressive packets of the stream. Xirong Bao et al. [6] Planning to enhance the capacity of security and feasibility of wireless sensor networks ,in the wake of considering the issues of network security, traffic issues, memory issues and computational complexity issue, this paper proposes a key management scheme in light of collection inside of cluster to take care of the issue of poor scalability, low work efficiency and communication times . P. Raghu Vamsi et al. [7] In this paper, the creators exhibited a scientific classification and description of state-of-the-art key management schemes. Audits and classifications are required for further research and for distinguishing examination challenges. In this article, the authors displayed classification of the most recent advancements in key management in perspective of different system and security measurements. TESLA (Timed, Efficient, Streaming, Loss tolerant, Authentication) is a multicast validation protocol later enhanced as small scale rendition μTESLA for broadcast authentication. To accomplish scalability, μTESLA reached out as multilevel μTESLA. Jaewoo Choi et al. [8] In this paper, an area based key management scheme for WSNs has been presented. To take care of a communication obstruction issue in LDK and comparative systems, they conceived another key modification
117
ISSN:2229-6093
Riddhi J Gandhi et al, Int.J.Computer Technology & Applications,Vol 7 (1),115-119
prepare that fuses grid based location data. The creators exhibited LDK+, which is an enhanced variant of the LDK scheme. They included key corrections by fusing the utilization of grid information into the past combining so as to separate strategy, and they recommended key era the lattice data. In this manner, they take care of the issue of lacking quantities of nonce that can happen under the state of communication interface.
V. REFERENCES [1]
Abdoulaye Diop, Yue Qi and Qin Wang,"An Efficient and Secure Session Key Management Scheme for Cluster Based Wireless Sensors Networks" in Springer International, 2014.
[2]
Huei-wen Ferng, Jeffrey Nurhakim," Key Management for a Large-Scale Wireless Sensor Network" in IEEE, 2014.
Ata Ullah Ghafoor1 et al. [9] To minimize energy utilization and enhance system lifetime, this paper introduces a lightweight XOR based Key Freshness Scheme (XKFS), which permits reviving the key without inter node message transmission. A solitary message containing an enchantment word is transmitted by the group head to its part nodes and keys are revived utilizing XOR and left move operations. XKFS just requires a light weight message from an all the more capable head node and thus, decreases the quantity of messages traded among part nodes. It likewise lessens the message size and along these lines helps in decreasing the transmission cost. In the end, it decreases the communication overhead and expands the sensor node life.
[3]
Yuying Wang1, Zhongyuan Qin1, Qunfang Zhang2, Hengkang Wang1 and Jie Huang1," A Key Predistribution Scheme based on Multiple Key Spaces in Wireless Sensor Networks" in IEEE, 2014.
[4]
N. Renugadevi*, G. Swaminathan and Aditya S Kumar," Key Management Schemes for Secure Group Communication in Wireless Networks – A Survey" in IEEE, 2014.
[5]
Rohit Vaid and Vijay Katiyar," Vlkm: Virtual Location based Key Management Scheme for Wireless Sensor Network" in IEEE, 2014.
[6]
XirongBao, JinLiu, LihuangShe and ShiZhang," A Key Management Scheme based on Grouping within Cluster" in IEEE, 2014.
Xiaobing He et al. [10] In this paper, the authors introduced an outline of state of the art dynamic key management scheme in WSNs. With the wide use of WSNs, as one of the principal security issues, dynamic key management is drawing in more consideration from the specialists and modern designers and numerous plans were at that point proposed. At last, a few conceivable future examination bearings for dynamic key management are give.
[7]
P. Raghu Vamsi and Krishna Kant," A Taxonomy of Key Management Schemes of Wireless Sensor Networks" in IEEE, 2015.
[8]
Jaewoo Choi, Jihyun Bang, LeeHyung Kim, Mirim Ahn, and Taekyoung Kwon," Location-based Key Management Strong Against Insider Threats in Wireless Sensor Networks" in IEEE, 2015.
[9]
AtaUllah Ghafoor1,2, Muhammad Sher2, Muhammad Imran3 and Kashif Saleem4," A Lightweight Key Freshness Scheme for Wireless Sensor Networks" in IEEE, 2015.
IV.
CONCLUSION
In this paper, we exhibited a diagram of the dynamic key management schemes in WSNs. With the utilization of WSNs, as one of the essential security issues, dynamic key management is pulling in more consideration from the specialists and engineers and numerous schemes were at that point proposed. We talked about the essential necessities of dynamic key management in WSNs, overviewed the papers for these environments and finally, we have condensed it is impractical to discover one single perfect scheme can perform well in all assessment measurements as each of them has some strengths, shortcomings and suitability for particular circumstances. A definitive goal of this study is to urge more analysts to plan and enhance potential recommendations in dynamic key management for wireless sensor networks.
[10] Xiaobing He∗, Michael Niedermeier and Hermann de Meer," Dynamic Key Management in Wireless Sensor Networks: A Survey" in Journal of Network and Computer Applications , 2013.
[11] Zhongyuan Qin1,2, Kerong Feng1, Shuaiqi Hu1, Lei Tao1, Zunli Hu1, Xinshuai Zhang1, Jie Huang1," A Novel Identity-based Security Scheme for Wireless Sensor Networks" in 10th International Conference on Computational Intelligence and Security, IEEE, 2014.
[12] B.Jiana and E.Xu, “An Energy-efficient Security Nodebased Key Management Protocol for WSN” in 2nd International Symposium on Computer , Communication, Control and Automation, 2013.
[13] X. He, M. Niedermeier and H. Meer “Dynamic Key Management in Wireless Sensor Networks:A survey” in
IJCTA | Jan-Feb 2016 Available
[email protected]
118
ISSN:2229-6093
Riddhi J Gandhi et al, Int.J.Computer Technology & Applications,Vol 7 (1),115-119
[14]
Journal of Network and Computer Applications, pp.611-622, 2012. Zhang Y.Y. ,Li X.Z.,Cao, J.P.,Zeng, L.K.,Zhen Y. and Gao D.Q, “Distance-Based key management in Hierarchical Wireless Sensor Network” in International Conference on Automatic Control and Artificial Intelligence IEEE, 2012, pp.915-18.
[15] I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam and E. Cayirci," Wireless Sensor Networks: A Survey" in Elsevier, 2001.
IJCTA | Jan-Feb 2016 Available
[email protected]
119