Wireless Sensor Network (WSN) is frequently
exposed to attackers. The data transmission in secure
channel enhances the data confidentiality. This paper
discusses multiple schemes with different approaches.
Periodic key updating becomes a main point in the design of
each scheme. The key updating enhances the security level
because of the difficulties added in the network cracking.
The performance of each scheme is discussed to show the
drawbacks of the public ideas used in the design of these key
management schemes. One of these drawbacks is the
drawback in the mathematical use of the modular function
to generate a shared key between the two parties. This
drawback is used in the new schemes and it is illustrated in
a numerical example in this paper. The results show also the
preference of key updating with each packet to the other
discussed schemes.
Amr M. Kishk : Reactor department, Egyptian Atomic Energy Authority (EAEA)
Nasr City, Cairo, 9621, Egypt
Nagy W. Messiha : Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering (FEE), Elmounfya University
Menouf, Elmounfya, 23952, Egypt
Nawal A. El-Fishawy : Computer Science and Engineering, Faculty of Electronic Engineering (FEE), Elmounfya University
Menouf, Elmounfya, 23952, Egypt
Abd-Elrahman A. Alkafs : Reactor Department, Egyptian Atomic Energy Authority (EAEA)
Nasr City, Cairo, 9621, Egypt
Ahmed H. Madian : Radiation Technology Engineering, Egyptian Atomic Energy Authority (EAEA)
Nasr City, Cairo, 9621, Egypt
Pairwise Key
Shared Key
Key Updating
Public
and Private Keys
The data security in the WSN is based on the key
management schemes used authenticate the sensor nodes
to each others and also with BS. These schemes secure the
communication channels in the WSN and exchange the
encryption keys used to encrypt the exchanged data in the
communication channels. Many different schemes are
discussed in the paper. The concepts of these schemes are
based on two aspects. These aspects are the preloading
initial key(s) in each sensor node and the dependence on
the use of public and secret key(s). The discussion of these
schemes showed the drawbacks of these schemes. These
drawbacks give the ability to the hackers to crack the
network. The error in the use of modular operation to get
the shared key and the dependence on a public key to
encrypt/decrypt the data are two drawbacks discussed in
this paper. The two drawbacks are famous in most key
management schemes.
[1] V. Rathod and M. Mehta, "Security in Wireless Sensor
Network: A survey", Ganpat University Journal of
Engineering & Technology, vol. 1, no. 1, Jan. 2011.
[2] A. Kishk, N. Messiha, N. Ayad, N. El-Fishawy, and F.
Abdel-Samie, "Enhancement in the Identities-Exchange
Process during the Authentication Process", (IJCNS)
International Journal of Computer and Network Security,
vol. 1, no. 3, Dec. 2009.
[3] F. Moghaddam, M. Alrashdan, and O. Karimi, "A
Hybrid Encryption Algorithm Based on RSA Small-e and
Efficient-RSA for Cloud Computing Environments",
Journal of Advances in Computer Network, vol. 1, no. 3,
Sep. 2013.
[4] R. Kayalvizhi, M. Vijayalakshmi, and V. Vaidehi,
"Energy Analysis of RSA and ELGAMAL Algorithms for
wireless Sensor Networks", Recent Trends in Network
Security and Applications Communications in Computer
and Information Science, vol. 89, pp. 172-180, 2010
[5] A. Kaur, "Energy Analysis of Wireless Sensor Networks
using RSA and ECC Encryption Method", International
Journal of Scientific & Engineering Research, vol. 4, no.
5, May 2013.
[6] J. Huang, S. Yang, and C. Dai, "An Efficient Key
Management Scheme for Data-Centric Storage Wireless
Sensor Networks", 2013 International Conference on
Electronic Engineering and Computer Science
(ELSEVIER), IERI Procedia 4, pp. 25-31, 2013.
[7] A. Guermazi and M. Abid, "An Efficient Key
Distribution Scheme to Secure Data-Centric Routing
Protocols in Hierarchical Wireless Sensor Networks",
The 2nd International Conference on Ambient Systems,
Networks and Technologies (ELSEVIER), Procedia
Computer Science 5, pp. 208-215, 2011.
[8] Z. Yiying, W. Chunying, C. Jinping, and L. Xiangzhen,
"A Secret Sharing-Based Key Management in
Hierarchical Wireless Sensor Network", International
Journal of Distributed Sensor Networks (Hindawi
Publishing Coporation), Article ID 406061, vol. 2013.
[9] S. Choi, K. Kim, and H. Youn, "An Energy-Efficient
Key Predistribution Scheme for Secure Wireless Sensor
Networks Using Eigenvector", International Journal of
Distributed Sensor Networks (Hindawi Publishing
Coporation), Article ID 216754, vol. 2013. [10] B. Enjian and J. Xueqin, "A Dynamic Key Management
Scheme Based on Secret Sharing for Hierarchical
Wireless Sensor Network", TELKOMNIKA, vol. 11,
no. 3, pp. 1514-1523, March 2013.
[11] S. Khan, C. Pastrone, L. Lavagno, and M. Spirito, "An
Authentication and Key Establishment Scheme for the
IP-Based Wireless Sensor Network", The 7th
International Symposium on Intelligent Systems
Techniques for Ad Hoc and Wireless Sensor Networks
(ELSEVIR), Procedia Computer Science 10, pp. 1039-
1045, 2012.
[12] A. Kishk, N. Messiha, N. El-Fishawy, A. Alkafs, and
A. Madian, "Proposed Hierarchical Routing Protocol
with Simple Nodes Locating Algorithm for
Authenticated Nodes in Wireless Sensor Network",
International Conference on Engineering and
Technology (ICET), 2014.