Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Performance Analysis of Multiple Key Management Schemes in Wireless Sensor Network  
  Authors : Amr M. Kishk; Nagy W. Messiha; Nawal A. El-Fishawy; Abd-Elrahman A. Alkafs; Ahmed H. Madian
  Cite as:

 

Wireless Sensor Network (WSN) is frequently exposed to attackers. The data transmission in secure channel enhances the data confidentiality. This paper discusses multiple schemes with different approaches. Periodic key updating becomes a main point in the design of each scheme. The key updating enhances the security level because of the difficulties added in the network cracking. The performance of each scheme is discussed to show the drawbacks of the public ideas used in the design of these key management schemes. One of these drawbacks is the drawback in the mathematical use of the modular function to generate a shared key between the two parties. This drawback is used in the new schemes and it is illustrated in a numerical example in this paper. The results show also the preference of key updating with each packet to the other discussed schemes.

 

Published In : IJCSN Journal Volume 4, Issue 3

Date of Publication : June 2015

Pages : 461 - 468

Figures :--

Tables : --

Publication Link : Performance Analysis of Multiple Key Management Schemes in Wireless Sensor Network

 

 

 

Amr M. Kishk : Reactor department, Egyptian Atomic Energy Authority (EAEA) Nasr City, Cairo, 9621, Egypt

Nagy W. Messiha : Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering (FEE), Elmounfya University Menouf, Elmounfya, 23952, Egypt

Nawal A. El-Fishawy : Computer Science and Engineering, Faculty of Electronic Engineering (FEE), Elmounfya University Menouf, Elmounfya, 23952, Egypt

Abd-Elrahman A. Alkafs : Reactor Department, Egyptian Atomic Energy Authority (EAEA) Nasr City, Cairo, 9621, Egypt

Ahmed H. Madian : Radiation Technology Engineering, Egyptian Atomic Energy Authority (EAEA) Nasr City, Cairo, 9621, Egypt

 

 

 

 

 

 

 

Pairwise Key

Shared Key

Key Updating

Public and Private Keys

The data security in the WSN is based on the key management schemes used authenticate the sensor nodes to each others and also with BS. These schemes secure the communication channels in the WSN and exchange the encryption keys used to encrypt the exchanged data in the communication channels. Many different schemes are discussed in the paper. The concepts of these schemes are based on two aspects. These aspects are the preloading initial key(s) in each sensor node and the dependence on the use of public and secret key(s). The discussion of these schemes showed the drawbacks of these schemes. These drawbacks give the ability to the hackers to crack the network. The error in the use of modular operation to get the shared key and the dependence on a public key to encrypt/decrypt the data are two drawbacks discussed in this paper. The two drawbacks are famous in most key management schemes.

 

 

 

 

 

 

 

 

 

[1] V. Rathod and M. Mehta, "Security in Wireless Sensor Network: A survey", Ganpat University Journal of Engineering & Technology, vol. 1, no. 1, Jan. 2011. [2] A. Kishk, N. Messiha, N. Ayad, N. El-Fishawy, and F. Abdel-Samie, "Enhancement in the Identities-Exchange Process during the Authentication Process", (IJCNS) International Journal of Computer and Network Security, vol. 1, no. 3, Dec. 2009. [3] F. Moghaddam, M. Alrashdan, and O. Karimi, "A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments", Journal of Advances in Computer Network, vol. 1, no. 3, Sep. 2013. [4] R. Kayalvizhi, M. Vijayalakshmi, and V. Vaidehi, "Energy Analysis of RSA and ELGAMAL Algorithms for wireless Sensor Networks", Recent Trends in Network Security and Applications Communications in Computer and Information Science, vol. 89, pp. 172-180, 2010 [5] A. Kaur, "Energy Analysis of Wireless Sensor Networks using RSA and ECC Encryption Method", International Journal of Scientific & Engineering Research, vol. 4, no. 5, May 2013. [6] J. Huang, S. Yang, and C. Dai, "An Efficient Key Management Scheme for Data-Centric Storage Wireless Sensor Networks", 2013 International Conference on Electronic Engineering and Computer Science (ELSEVIER), IERI Procedia 4, pp. 25-31, 2013. [7] A. Guermazi and M. Abid, "An Efficient Key Distribution Scheme to Secure Data-Centric Routing Protocols in Hierarchical Wireless Sensor Networks", The 2nd International Conference on Ambient Systems, Networks and Technologies (ELSEVIER), Procedia Computer Science 5, pp. 208-215, 2011. [8] Z. Yiying, W. Chunying, C. Jinping, and L. Xiangzhen, "A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network", International Journal of Distributed Sensor Networks (Hindawi Publishing Coporation), Article ID 406061, vol. 2013. [9] S. Choi, K. Kim, and H. Youn, "An Energy-Efficient Key Predistribution Scheme for Secure Wireless Sensor Networks Using Eigenvector", International Journal of Distributed Sensor Networks (Hindawi Publishing Coporation), Article ID 216754, vol. 2013. [10] B. Enjian and J. Xueqin, "A Dynamic Key Management Scheme Based on Secret Sharing for Hierarchical Wireless Sensor Network", TELKOMNIKA, vol. 11, no. 3, pp. 1514-1523, March 2013. [11] S. Khan, C. Pastrone, L. Lavagno, and M. Spirito, "An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Network", The 7th International Symposium on Intelligent Systems Techniques for Ad Hoc and Wireless Sensor Networks (ELSEVIR), Procedia Computer Science 10, pp. 1039- 1045, 2012. [12] A. Kishk, N. Messiha, N. El-Fishawy, A. Alkafs, and A. Madian, "Proposed Hierarchical Routing Protocol with Simple Nodes Locating Algorithm for Authenticated Nodes in Wireless Sensor Network", International Conference on Engineering and Technology (ICET), 2014.