Research Article

Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network

by  Jyothi Metan, K N Narasimha Murthy
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Issue 12
Published: May 2015
Authors: Jyothi Metan, K N Narasimha Murthy
10.5120/20605-3225
PDF

Jyothi Metan, K N Narasimha Murthy . Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network. International Journal of Computer Applications. 117, 12 (May 2015), 9-15. DOI=10.5120/20605-3225

                        @article{ 10.5120/20605-3225,
                        author  = { Jyothi Metan,K N Narasimha Murthy },
                        title   = { Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 117 },
                        number  = { 12 },
                        pages   = { 9-15 },
                        doi     = { 10.5120/20605-3225 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Jyothi Metan
                        %A K N Narasimha Murthy
                        %T Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network%T 
                        %J International Journal of Computer Applications
                        %V 117
                        %N 12
                        %P 9-15
                        %R 10.5120/20605-3225
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In the recent times the concept of group key management is found to be one of the very essential issues in the field of wireless sensor network. Because of the dual impact limitations and various operations in open and hash environment the security and confidentiality which are considered as very challenging issues in WSN. The main issues which are associated with securing the sensor network have more complexity when the group communication of the network is considered. This paper addresses the security issues associated with the Group key management techniques and ensures some significant conclusions for group key management in cluster tree WSNs. A group is defined as a set of sensor nodes present in cluster based tree network and shares some sensory information such as temperature, pressure, etc. The main objective of the paper is to highlights some of the significant issues which are associated with the authentication of the group key data exclusively for the members who have a secure access to the group information. This study contributes an overview of secure an efficient group management mechanisms for cluster tree networks and in between group members. In order to focus on the various issues and limitations a comparative analysis of various key management techniques have been done and evaluated. The schemes are allowed to maintain multiple groups and rekey desperately. This paper focuses on the various group key management issues that outperforms conventional techniques of group key management.

References
  • Ameen, A. , and Kwak, K. S. 2011. Social Issues in wireless sensor networks with healthcare perspective. Int. Arab J. Inf. Techno, Vol. 8(1), pp. 52-58
  • Sen, J. 2012. Security in wireless sensor networks. Wireless Sensor Networks: Current Status and Future Trends, Khan, pp. 407-460
  • J-H. S and S-W. S. 2015. Group Key Managements in Wireless Sensor Networks. www. intechopen. com
  • Younis, M. , Ghumman, K. , Eltoweissy, M. 2006. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. Parallel and Distributed Systems, IEEE Transactions, Vol. 17, No. 8, pp. 865-882
  • Yu, M. , Mokhtar, H. , Merabti, M . 2007. Fault management in wireless sensor networks. Wireless Communications, IEEE, Vol. 14, No. 6, pp. 13-19
  • Alagheband, M. R. , Aref, M. R. 2012. Dynamic and secure key management model for hierarchical heterogeneous sensor networks. Information Security, IET, Vol. 6, No. 4, pp. 271-280
  • Barachi, M. , Kadiwal, A. , Glitho, R. , Khendek, F. , Dssouli, R. 2010. The design and implementation of architectural components for the integration of the IP multimedia subsystem and wireless sensor networks. Communications Magazine, IEEE, Vol. 48, No. 4, pp. 42-50
  • Erol-Kantarci, M. , Mouftah, H. T. 2011. Wireless Sensor Networks for Cost-Efficient Residential Energy Management in the Smart Grid. Smart Grid, IEEE Transactions, Vol. 2, No. 2, pp. 314-325
  • Anderson, R. , Haowen, C. , Perrig, A. 2004. Key Infection: Smart Trust for Smart Dust, 20 in: 12th IEEE International Conference on Network Protocols (ICNP), Berlin, Germany, 206–215
  • da Cunha, A. B. , da Silva, D. C. 2012. Behavioral Model of Alkaline Batteries for Wireless Sensor Networks. Latin America Transactions, IEEE (Revista IEEE America Latina), Vol. 10, No. 1, pp. 1295-1304
  • Ren, K. , Lou, W. , Zhang, Y. 2008. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. Mobile Computing, IEEE Transactions, Vol. 7, No. 5, pp. 585-598
  • Yetgin, H. , Cheung, K. T. K. , El-Hajjar, M. , Hanzo, L. 2014. Cross-layer network lifetime optimization considering transmit and signal processing power wireless sensor networks. Wireless Sensor Systems, IET , Vol. 4, No. 4, pp. 176-182
  • Qian, Y. , Lu, K. , Tipper, D. 2007. A design for secure and survivable wireless sensor networks. Wireless Communications, IEEE , Vol. 14, No. 5, pp. 30-37
  • Yang, S. , Yang, X. , McCann, J. A. , Zhang; T. , Liu, G. , Liu, Z. 2013. Distributed Networking in Autonomic Solar Powered Wireless Sensor Networks. Selected Areas in Communications, IEEE Journal, Vol. 31, No. 12, pp. 750-761
  • Wang; L. , Xu, L. D. , Bi, Z. , Xu, Y. 2014. Data Cleaning for RFID and WSN Integration. Industrial Informatics, IEEE Transactions, Vol. 10, No. 1, pp. 408-418
  • Bechkit, W. , Challal, Y. , Bouabdallah, A. , Tarokh, V. 2013. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. Wireless Communications, IEEE Transactions, Vol. 12, No. 2, pp. 948-959
  • Ruj, S. , Nayak, A. , Stojmenovic, I. 2013. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications. Computers, IEEE Transactions, Vol. 62, No. 11, pp. 2224-2237
  • Ma, U. , Lou, W. , Li, X-Y. 2014. Contiguous Link Scheduling for Data Aggregation in Wireless Sensor Networks. Parallel and Distributed Systems, IEEE Transactions, Vol. 25, No. 7, pp. 1691-1701
  • Gu, W. , Dutta, N. , Chellappan, S. , Bai, X. 2011. Providing End-to-End Secure Communications in Wireless Sensor Networks, Network and Service Management, IEEE Transactions, Vol. 8, No. 3, pp. 205-218
  • Seo, S-H. , Won, J. , Sultana, S. , Bertino, E. 2015. Effective Key Management in Dynamic Wireless Sensor Networks. Information Forensics and Security, IEEE Transactions, Vol. 10, No. 2, pp. 371-383
  • Klaoudatou, E. , Konstantinou, E. , Kambourakis, G. , Gritzalis, S. 2011. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs. Communications Surveys & Tutorials, IEEE, Vol. 13, No. 3, pp. 429-442
  • Yu, C-M. , Lu, C-S. , Kuo, S-Y. 2010. Noninteractive Pairwise Key Establishment for Sensor Networks. Information Forensics and Security, IEEE Transactions, Vol. 5, No. 3, pp. 556-569
  • Dong; W. , Chen, C. , Liu, X. , Bu, J. 2010. Providing OS Support for Wireless Sensor Networks: Challenges and Approaches. Communications Surveys & Tutorials, IEEE , Vol. 12, No. 4, pp. 519-530
  • Wang; L. , Xu, L. D. , Bi, Z. , Xu, Y. 2014. Data Cleaning for RFID and WSN Integration. Industrial Informatics, IEEE Transactions , Vol. 10, No. 1, pp. 408-418
  • Ruiz, L. B. , Nogueira, J. M. , Loureiro, A. A. F. 2003. MANNA: a management architecture for wireless sensor networks. Communications Magazine, IEEE , Vol. 41, No. 2, pp. 116-125
  • Camtepe, S. A. , Yener, B. 2007. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. Networking, IEEE/ACM Transactions, Vol. 15, No. 2, pp. 346-358
  • Poornima, A. S. , Amberker, B. B. 2011. Secure data collection using mobile data collector in clustered wireless sensor networks. Wireless Sensor Systems, IET , Vol. 1, No. 2, pp. 85-95
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Secure group management Group communication Wireless sensor networks (WSNs) Security.

Powered by PhDFocusTM