Document Type : Research Paper

Authors

1 University of Mosul - College of Computer Science and Mathematics

2 University of Anbar - College of Computer

10.37652/juaps.2012.63239

Abstract

Wireless sensor networks (WSNs) are infrastructure-less and resource constraint networks composed of many sensor nodes. These sensors collect information from the area of sense and deliver that information to the base station. WSNs are usually deployed in unattended environment and like other networks need to be secured. In order to secure WSNs, firstly cryptography keys must be distributed in a secure and robust way. Key management problem is rapidly studied in the static WSNs, but it has not been studied thoroughly in mobile (or dynamic) WSNs. When mobility is introduced within WSNs, many challenges and new characteristics appear in the security model. Security requirements for mobile WSNs include authentication, confidentiality, and integrity. The key management scheme represents the corner stone for achieving security services. In this paper, we propose a key management scheme for mobile WSNs which based on track-sector clustering in the roaming area. The proposed system is relying on symmetric cryptography for achieving its goals. The paper represents a work-in-progress report on our advance in the development of this proposal.

Keywords

Main Subjects

[1] Zhang, J. and Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33, 63-75.
[2] Zhou, Y., Fang, Y. and Zhang, Y. (2008). Securing Wireless Sensor Networks: A Survey. IEEE Communications Surveys & Tutorials, 10, 6-28.
[3] Yang, H., Luo, H. Y., Ye, F., Lu, S. W. and Zhang, L. (2004). Security in Mobile Ad hoc Networks: Challenges and Solutions. IEEE Wireless Communications, Vol. 11, pp. 38-47.
[4] Sarma, H. K., Kar, A. and Mall, R. (2009). Energy Efficient Communication Protocol for Mobile Wireless Sensor Network System.  IJCSNS, Vol. 9, pp.386-394.
[5] Gautan, N., Lee, W. and Pyun, J. (2009). Track-sector Clustering for Energy Efficient Routing in Wireless Sensor Network. The 9th IEEE International Conference on Computer and Information Technology, Vol. 2, pp. 116-121.
[6] Eschenauer, L. and Gligor, D. (2002). A key management scheme for distributed sensor  networks. The 9th ACM Conference on Computer and Communications Security, Washington DC , USA.
[7] Chan, H., Perrig, A. and Song, D. (2003). Random Key Predistribution Schemes for Sensor Networks. IEEE Symposium on Research in Security and Privacy Oakland, California  USA.
[8] Liu, D., Ning, P. and Du, W. (2005). Group-Based Key Pre-Distribution in Wireless Sensor Networks. Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005).
[9] Shen, L., Feng, H., Qiu, Y. and Ding, H. (2008). A New Kind of Cluster-based Key Management Protocol in Wireless Sensor Network.  Proceedings of the IEEE Conference of Networking, Sensing and Control.
[10] Deng, J., Han, Y., Chen, S. and Varshney, P. (2004). A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE INFOCOM 2004. Los Alamitos, CA , USA.
[11] Liu, D. and Ning, P. (2003). Location-based pairwise key establishments for static sensor networks. First ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), New York, NY, USA
[12] Yu, Z. and Guan, Y. (2008). A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transactions on Parallel Distribution and Systems, 19, 1411–1425.
[13] Huang, D., Mehta, M., Medhi, D. and Harn, L. (2004). Location-aware key management scheme for wireless sensor networks. The 2nd ACM workshop on Security of Ad Hoc and Sensor Networks.
[14] Kifayat, K., Merabti, M., Shi, Q. and Llewellyn-Jones, D. (2010). Group-based key management for mobile sensor networks. Proceedings of 2010 IEEE Sarnoff Symposium. Princeton, NJ, USA.
[15] Zhou, Y., Ni, J. and Ravishankar, C. (2005). Efficient Key Establishment for Group-Based Wireless Sensor Deployments. Proceedings of the 4th ACM Workshop on Wireless Security (WiSe '05), Cologne, Germany, September, 2005.
[16] Ünlü, A. and Levi, A. (2010). Two-tier, scalable and highly resilient key predistribution scheme for location-aware wireless sensor network deployments. Mob. Netw. Appl., Vol. 15, No. 4, pp. 517-529.
[17] Dong, Q. and Liu, D. (2007). Using auxiliary sensors for pair-wise key establishment in WSN. Proceedings of the 6th international IFIPTC6 Conference on Ad Hoc and Sensor Networks, Wireless Networks, Next Generation internet, Atlanta, GA, USA, May 14 - 18, 2007.
[18] Sensoria (2012). Sensoria. Sensoris Corporation [Online]. Available on: www.sensoria.com.
[19] Sharma, K., Ghost, S.K. and Ghost, M.K. (2009). Security Model For Hierarchical Clustered Wireless Sensor Network. International Journal of Computer Science and Security.