IoT 20(23): e2

Research Article

Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme

Download703 downloads
  • @ARTICLE{10.4108/eai.2-10-2020.166541,
        author={Anubrata Chanda and Pampa Sadhukhan and Nandini Mukherjee},
        title={Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme},
        journal={EAI Endorsed Transactions on Internet of Things},
        volume={6},
        number={23},
        publisher={EAI},
        journal_a={IOT},
        year={2020},
        month={10},
        keywords={wireless sensor network (WSN), key management scheme (KMS), hierarchical, symmetric, asymmetric, robust},
        doi={10.4108/eai.2-10-2020.166541}
    }
    
  • Anubrata Chanda
    Pampa Sadhukhan
    Nandini Mukherjee
    Year: 2020
    Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme
    IOT
    EAI
    DOI: 10.4108/eai.2-10-2020.166541
Anubrata Chanda1, Pampa Sadhukhan1,*, Nandini Mukherjee2
  • 1: School of Mobile Computing & Communication, Jadavpur University, India - 700032
  • 2: Dept. of Computer Sc. & Engineering, Jadavpur University, India - 700032
*Contact email: pampa.sadhukhan@ieee.org

Abstract

Secure data transmission within the wireless sensor networks (WSNs) is a critical issue as they are mostly deployed in the open areas. Moreover, the communication between the cluster head (CH) and the base station(BS) in a hierarchical WSN is required to be more secure since the CH is responsible for data collection, aggregation and its forwarding to the BS. Thus, this paper aims to design a hybrid key management scheme (KMS) for the hierarchical WSNs for enhancing security between the CH and BS by using some asymmetric cryptographic technique while applying the secret key based communication among the member nodes to reduce their computational overheads. The security analysis of our proposed scheme exhibits its robustness against the node capture attack and its ability to support the node revocation. The performances of proposed scheme are also evaluated in term of data freshness, average number of keys established, throughput and computational cost to demonstrate its efficiency.