Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 816549, 13 pages
http://dx.doi.org/10.1155/2014/816549
Research Article

A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks

1School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen 518055, China
2Shenzhen Key Laboratory of Internet Information Collaboration, Shenzhen 518055, China

Received 28 February 2014; Accepted 26 March 2014; Published 10 April 2014

Academic Editors: T. Cao, M. Ivanovic, and F. Yu

Copyright © 2014 Chien-Ming Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H.-C. Shih, J.-H. Ho, B.-Y. Liao, and J.-S. Pan, “Hierarchical gradient diffusion algorithm for wireless sensor networks,” in Recent Trends in Applied Artificial Intelligence, pp. 480–489, Springer, 2013. View at Google Scholar
  2. M. Demirbas, A. Arora, V. Mittal, and V. Kulathumani, “A fault-local self-stabilizing clustering service for wireless ad hoc networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 9, pp. 912–922, 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Basagni, M. Mastrogiovanni, A. Panconesi, and C. Petrioli, “Localized protocols for ad hoc clustering and backbone formation: a performance comparison,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 4, pp. 292–306, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. S. R. Das, C. E. Perkins, and E. M. Royer, “Performance comparison of two on-demand routing protocols for ad hoc networks,” in Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00), vol. 1, pp. 3–12, March 2000. View at Scopus
  5. P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 388–404, 2000. View at Publisher · View at Google Scholar · View at Scopus
  6. X. Du, Y. Xiao, S. Ci, M. Guizani, and H.-H. Chen, “A routing-driven key management scheme for heterogeneous sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '07), pp. 3407–3412, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Durresi, V. Bulusu, V. Paruchuri, M. Durresi, and R. Jain, “WSN09-4: key distribution in mobile heterogeneous sensor networks,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), pp. 1–5, December 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Hussain, F. Kausar, and A. Masood, “An efficient key distribution scheme for heterogeneous sensor networks,” in Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC '07), pp. 388–392, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. P. Traynor, H. Choi, G. Cao, S. Zhu, and T. La Porta, “Establishing pair-wise keys in heterogeneous sensor networks,” in Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), pp. 1–12, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, “Efficient hybrid security mechanisms for heterogeneous sensor networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 663–677, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. E. Duarte-Melo and M. Liu, “Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '02), vol. 1, pp. 21–25, 2002.
  12. L. Girod, T. Stathopoulos, N. Ramanathan et al., “A system for simulation, emulation, and deployment of heterogeneous sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 201–213, November 2004. View at Scopus
  13. X. Du and F. Lin, “Maintaining differentiated coverage in heterogeneous sensor networks,” Eurasip Journal on Wireless Communications and Networking, vol. 5, no. 4, pp. 565–572, 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Lazos and R. Poovendran, “Stochastic coverage in heterogeneous sensor networks,” ACM Transactions on Sensor Networks, vol. 2, no. 3, pp. 325–358, 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. Lin, J. Zhang, H. S.-H. Chung, W. H. Ip, Y. Li, and Y.-H. Shi, “An ant colony optimization approach for maximizing the lifetime of heterogeneous wireless sensor networks,” IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, vol. 42, no. 3, pp. 408–420, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. C.-M. Chen, Y.-H. Lin, Y.-C. Lin, and H.-M. Sun, “RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 4, pp. 727–734, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. S. U. Khan, L. Lavagno, and C. Pastrone, “A key management scheme supporting node mobility in heterogeneous sensor networks,” in Proceedings of the 6th International Conference on Emerging Technologies (ICET '10), pp. 364–369, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. Q. Shi, N. Zhang, M. Merabti, and K. Kifayat, “Resource-efficient authentic key establishment in heterogeneous wireless sensor networks,” Journal of Parallel and Distributed Computing, vol. 73, no. 2, pp. 235–249, 2013. View at Google Scholar
  19. H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, “An efficient countermeasure to the selective forwarding attack in wireless sensor networks,” in Proceedings of the IEEE Region 10 Conference (TENCON '07), pp. 1–4, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. C. M. Chen, Y. H. Lin, Y. H. Chen, and H. M. Sun, “Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 57–72, 2013. View at Google Scholar
  21. H.-M. Sun, S.-P. Hsu, and C.-M. Chen, “Mobile Jamming attack and its countermeasure in wireless sensor networks,” in Proceedings of the 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia (AINAW '07), pp. 457–462, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. H.-M. Sun, Y.-H. Lin, Y.-C. Hsiao, and C.-M. Chen, “An efficient and verifiable concealed data aggregation scheme in wireless sensor networks,” in Proceedings of the International Conference on Embedded Software and Systems (ICESS '08), pp. 19–26, July 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. L. Kong, C. M. Chen, H. C. Shih, C. W. Lin, B. Z. He, and J. S. Pan, “An energy-aware routing protocol using cat swarm optimization for wireless sensor networks,” in Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, pp. 311–318, Springer, 2014. View at Google Scholar
  24. S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 62–72, October 2003. View at Scopus
  25. C. K. Wong, M. Gouda, and S. S. Lam, “Secure group communications using key graphs,” IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16–30, 2000. View at Publisher · View at Google Scholar · View at Scopus
  26. R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga, “LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks,” in Proceedings of the International Conference on Parallel Processing Workshops (ICPPW '03), pp. 397–406, 2003.
  27. A. S. Wandert, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy analysis of public-key cryptography for wireless sensor networks,” in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom '05), pp. 324–328, March 2005. View at Scopus