Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 4393721, 17 pages
http://dx.doi.org/10.1155/2016/4393721
Research Article

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

College of Information and Communication Engineering, Sungkyunkwan University, Suwon-Si 16419, Republic of Korea

Received 2 February 2016; Revised 19 March 2016; Accepted 10 April 2016

Academic Editor: Fei Yu

Copyright © 2016 Jiye Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002. View at Publisher · View at Google Scholar · View at Scopus
  3. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 357430, 14 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. M. K. Khan and K. Alghathbar, “Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’,” Sensors, vol. 10, no. 3, pp. 2450–2459, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. D. Nyang and M.-K. Lee, “Improvement of das's two-factor authentication protocol in wireless sensor networks,” IACR Cryptology ePrint Archive, vol. 2009, p. 631, 2009. View at Google Scholar
  6. J. Nam, M. Kim, J. Paik, Y. Lee, and D. Won, “A provably-secure ECC-based authentication scheme for wireless sensor networks,” Sensors, vol. 14, no. 11, pp. 21023–21044, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Kim, D. Lee, W. Jeon, Y. Lee, and D. Won, “Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks,” Sensors, vol. 14, no. 4, pp. 6443–6462, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. W. Jeon, J. Kim, J. Nam, Y. Lee, and D. Won, “An enhanced secure authentication scheme with anonymity for wireless environments,” IEICE Transactions on Communications, vol. 95, no. 7, pp. 2505–2508, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. S. A. Camtepe and B. Yener, “Key distribution mechanisms for wireless sensor networks: a survey,” Tech. Rep., Rensselaer Polytechnic Institute, Troy, NY, USA, 2005. View at Google Scholar
  10. Y. Lee, S. Kim, and D. Won, “Enhancement of two-factor authenticated key exchange protocols in public wireless LANs,” Computers & Electrical Engineering, vol. 36, no. 1, pp. 213–223, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. B. Lai, S. Kim, and I. Verbauwhede, “Scalable session key construction protocol for wireless sensor networks,” in Proceedings of the IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES '02), p. 7, December 2002.
  12. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, Washington, DC, USA, November 2002.
  13. Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 2–23, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. M. Eltoweissy, M. Moharrum, and R. Mukkamala, “Dynamic key management in sensor networks,” IEEE Communications Magazine, vol. 44, no. 4, pp. 122–130, 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. C. Paar and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, Springer Science & Business Media, 2009.
  16. C.-L. Chen and C.-T. Li, “Dynamic session-key generation for wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2008, no. 1, Article ID 691571, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Lee and K. Kim, “Key renewal scheme with sensor authentication under clustered wireless sensor networks,” Electronics Letters, vol. 51, no. 4, pp. 368–369, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Zhao, “Wireless sensor networks for industrial process monitoring and control: a survey,” Network Protocols and Algorithms, vol. 3, no. 1, pp. 46–63, 2011. View at Publisher · View at Google Scholar
  19. O. K. Sahingoz, “Large scale wireless sensor networks with multi-level dynamic key management scheme,” Journal of Systems Architecture, vol. 59, no. 9, pp. 801–807, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. B. Premamayudu, K. V. Rao, and P. S. Varma, “A novel pairwise key establishment and management in hierarchical wireless sensor networks (HWSN) using matrix,” in ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India—Vol I, pp. 425–432, Springer, 2014. View at Publisher · View at Google Scholar
  21. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  22. V. S. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology—CRYPTO '85 Proceedings, vol. 218 of Lecture Notes in Computer Science, pp. 417–426, Springer, 1986. View at Publisher · View at Google Scholar · View at MathSciNet
  23. J. Deng, R. Han, and S. Mishra, “Secure code distribution in dynamically programmable wireless sensor networks,” in Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN '06), pp. 292–300, ACM, Nashville, Tenn, USA, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  24. P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler, “Securing the deluge network programming system,” in Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN '06), pp. 326–333, Nashvill, Tenn, USA, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Lee, H. Kim, and K. Chung, “Hash-based secure sensor network programming method without public key cryptography,” in Proceedings of the Workshop on World-Sensor-Web (WSW '06), Boulder, Colo, USA, 2006.
  26. P. E. Lanigan, R. Gandhi, and P. Narasimhan, “Sluice: secure dissemination of code updates in sensor networks,” in Proceedings of the 26th IEEE Internationa26th IEEE International Conference on Distributed Computing Systems (ICDCS '06), p. 53, IEEE, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  27. M. L. Das and A. Joshi, “Dynamic program update in wireless sensor networks using orthogonality principle,” IEEE Communications Letters, vol. 12, no. 6, pp. 471–473, 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, “A study of the energy consumption characteristics of cryptographic algorithms and security protocols,” IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 128–143, 2006. View at Publisher · View at Google Scholar · View at Scopus
  29. W. Wang, S. Zhang, G. Duan, and H. Song, “Security in wireless sensor networks,” in Wireless Network Security, pp. 129–177, Springer, Berlin, Germany, 2013. View at Google Scholar
  30. J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: a survey,” in Security in Distributed, Grid, Mobile, and Pervasive Computing, Y. Xiao, Ed., vol. 1, p. 367, 2007. View at Google Scholar
  31. G. Wang, S. Kim, D. Kang, D. Choi, and G. Cho, “Lightweight key renewals for clustered sensor networks,” Journal of Networks, vol. 5, no. 3, pp. 300–312, 2010. View at Publisher · View at Google Scholar · View at Scopus
  32. H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proceedings of IEEE Symposium on Security and Privacy, pp. 197–213, Berkeley, Calif, USA, May 2003.
  33. W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228–258, 2005. View at Publisher · View at Google Scholar · View at Scopus
  34. D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41–77, 2005. View at Publisher · View at Google Scholar · View at Scopus
  35. R. Blom, “An optimal class of symmetric key generation systems,” in Advances in Cryptology, pp. 335–338, Springer, Berlin, Germany, 1985. View at Google Scholar
  36. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamic conferences,” in Advances in Cryptology—CRYPTO' 92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16–20, 1992 Proceedings, vol. 740 of Lecture Notes in Computer Science, pp. 471–486, Springer, Berlin, Germany, 1993. View at Publisher · View at Google Scholar
  37. M. Eltoweissy, A. Wadaa, S. Olariu, and L. Wilson, “Group key management scheme for large-scale sensor networks,” Ad Hoc Networks, vol. 3, no. 5, pp. 668–688, 2005. View at Publisher · View at Google Scholar · View at Scopus
  38. M. F. Younis, K. Ghumman, and M. Eltoweissy, “Location-aware combinatorial key management scheme for clustered sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 8, pp. 865–882, 2006. View at Publisher · View at Google Scholar · View at Scopus
  39. M. Eltoweissy, M. H. Heydari, L. Morales, and I. H. Sudborough, “Combinatorial optimization of group key management,” Journal of Network and Systems Management, vol. 12, no. 1, pp. 33–50, 2004. View at Publisher · View at Google Scholar · View at Scopus
  40. C.-L. Chen and I.-H. Lin, “Location-aware dynamic session-key management for grid-based wireless sensor networks,” Sensors, vol. 10, no. 8, pp. 7347–7370, 2010. View at Publisher · View at Google Scholar · View at Scopus
  41. M. H. Eldefrawy, M. K. Khan, and K. Alghathbar, “A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography,” in Proceedings of the International Conference on Anti-Counterfeiting, Security and Identification (ASID '10), pp. 1–6, IEEE, Chengdu, China, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  42. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  43. W. Zhang, S. Zhu, and G. Cao, “Predistribution and local collaboration-based group rekeying for wireless sensor networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1229–1242, 2009. View at Publisher · View at Google Scholar · View at Scopus
  44. S. Guo and A.-N. Shen, “A compromise-resilient pair-wise rekeying protocol in hierarchical wireless sensor networks,” Computer Systems Science and Engineering, vol. 25, no. 6, pp. 397–405, 2010. View at Google Scholar · View at Scopus
  45. Y. Zhang, C. Wu, J. Cao, and X. Li, “A secret sharing-based key management in hierarchical wireless sensor network,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 406061, 7 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  46. W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976. View at Google Scholar · View at Scopus
  47. J. Nam, K.-K. R. Choo, S. Han, M. Kim, J. Paik, and D. Won, “Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation,” PLoS ONE, vol. 10, no. 4, Article ID e0116709, 2015. View at Publisher · View at Google Scholar · View at Scopus
  48. M. L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1086–1090, 2009. View at Publisher · View at Google Scholar · View at Scopus
  49. C.-T. Li, C.-Y. Weng, and C.-C. Lee, “An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks,” Sensors, vol. 13, no. 8, pp. 9589–9603, 2013. View at Publisher · View at Google Scholar · View at Scopus
  50. Y. Choi, D. Lee, J. Kim, J. Jung, J. Nam, and D. Won, “Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography,” Sensors, vol. 14, no. 6, pp. 10081–10106, 2014. View at Publisher · View at Google Scholar · View at Scopus
  51. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences (HICSS '33), p. 10, January 2000. View at Scopus
  52. J. Rehana, “Security of wireless sensor network,” Tech. Rep. TKK-CSE-B5, Helsinki University of Technology, Helsinki, Finland, 2009. View at Google Scholar
  53. J. Zhang and V. Varadharajan, “Wireless sensor network key management survey and taxonomy,” Journal of Network and Computer Applications, vol. 33, no. 2, pp. 63–75, 2010. View at Publisher · View at Google Scholar · View at Scopus
  54. J. Sen, “A survey on wireless sensor network security,” International Journal of Communication Networks and Information Security, vol. 1, no. 2, 2010. View at Google Scholar
  55. S. Lee and K. Kim, “Sensor authentication scheme for clustering routing protocols in wireless sensor networks,” in Proceedings of the IEEE Sensors, pp. 1819–1822, IEEE, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  56. M. Stamp, Information Security: Principles and Practice, John Wiley & Sons, 2011.