Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks

Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive settings such as battlefield surveillance, border control, and infrastructure protection. Data confidentiality and authenticity are critical in these settings. However, the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on parallel and distributed systems 2006-08, Vol.17 (8), p.865-882
Hauptverfasser: Younis, M.F., Ghumman, K., Eltoweissy, M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 882
container_issue 8
container_start_page 865
container_title IEEE transactions on parallel and distributed systems
container_volume 17
creator Younis, M.F.
Ghumman, K.
Eltoweissy, M.
description Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive settings such as battlefield surveillance, border control, and infrastructure protection. Data confidentiality and authenticity are critical in these settings. However, the wireless connectivity, the absence of physical protection, the close interaction between WSNs and their physical environment, and the unattended deployment of WSNs make them highly vulnerable to node capture as well as a wide range of network-level attacks. Moreover, the constrained energy, memory, and computational capabilities of the employed sensor nodes limit the adoption of security solutions designed for wire-line and wireless networks. In this paper, we focus on the management of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem. Our scheme is termed SHELL because it is scalable, hierarchical, efficient, location-aware, and light-weight. Unlike most existing key management schemes for WSNs, SHELL supports rekeying and, thus, enhances network security and survivability against node capture. SHELL distributes key management functionality among multiple nodes and minimizes the memory and energy consumption through trading off the number of keys and rekeying messages. In addition, SHELL employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes by factoring the geographic location of nodes in key assignment. Simulation results demonstrate that SHELL significantly boosts the network resilience to attacks while conservatively consuming nodes' resources
doi_str_mv 10.1109/TPDS.2006.106
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TPDS_2006_106</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1652948</ieee_id><sourcerecordid>2544609071</sourcerecordid><originalsourceid>FETCH-LOGICAL-c426t-183b5c59f48c31bde73572034e8464a17801f4601a24523864d46bc3815c531d3</originalsourceid><addsrcrecordid>eNpdkM1Lw0AUxBdRsFaPnrwEL55S9-1XNsdSP7FqofUcNsmLpiZZ3U0o_e_dUkHw9IbhN49hCDkHOgGg6fVqcbOcMErVBKg6ICOQUscMND8MmgoZpwzSY3Li_ZpSEJKKEVnMbWH62nbxdGMcRjPb5nVneutq00RPuI2eTWfescWuj5bFRxBRZV00awbfo8MyWmLng_GC_ca6T39KjirTeDz7vWPydne7mj3E89f7x9l0HheCqT4OrXJZyLQSuuCQl5hwmTDKBWqhhIFEU6iEomCYkIxrJUqh8oJrCCkOJR-Tq_3fL2e_B_R91ta-wKYxHdrBZzpVjKYCeCAv_5FrO7gulMtSYAwoTViA4j1UOOu9wyr7cnVr3DYDmu3WzXbrZrt1g6MCf7Hna0T8Y5VkqdD8B1Yfc4g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>912210072</pqid></control><display><type>article</type><title>Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Younis, M.F. ; Ghumman, K. ; Eltoweissy, M.</creator><creatorcontrib>Younis, M.F. ; Ghumman, K. ; Eltoweissy, M.</creatorcontrib><description>Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive settings such as battlefield surveillance, border control, and infrastructure protection. Data confidentiality and authenticity are critical in these settings. However, the wireless connectivity, the absence of physical protection, the close interaction between WSNs and their physical environment, and the unattended deployment of WSNs make them highly vulnerable to node capture as well as a wide range of network-level attacks. Moreover, the constrained energy, memory, and computational capabilities of the employed sensor nodes limit the adoption of security solutions designed for wire-line and wireless networks. In this paper, we focus on the management of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem. Our scheme is termed SHELL because it is scalable, hierarchical, efficient, location-aware, and light-weight. Unlike most existing key management schemes for WSNs, SHELL supports rekeying and, thus, enhances network security and survivability against node capture. SHELL distributes key management functionality among multiple nodes and minimizes the memory and energy consumption through trading off the number of keys and rekeying messages. In addition, SHELL employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes by factoring the geographic location of nodes in key assignment. Simulation results demonstrate that SHELL significantly boosts the network resilience to attacks while conservatively consuming nodes' resources</description><identifier>ISSN: 1045-9219</identifier><identifier>EISSN: 1558-2183</identifier><identifier>DOI: 10.1109/TPDS.2006.106</identifier><identifier>CODEN: ITDSEO</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Clustering ; collusion attacks ; Combinatorial analysis ; combinatorial optimization ; Computer networks ; Cryptography ; Energy consumption ; energy efficient design ; Energy management ; exclusion basis systems ; key management ; Keys ; Large-scale systems ; location-aware protocols ; Management ; Memory management ; Network security ; Networks ; Protection ; Resilience ; secure group communications ; Security ; Sensors ; Shells ; Studies ; Surveillance ; Wireless networks ; Wireless sensor networks</subject><ispartof>IEEE transactions on parallel and distributed systems, 2006-08, Vol.17 (8), p.865-882</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2006</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c426t-183b5c59f48c31bde73572034e8464a17801f4601a24523864d46bc3815c531d3</citedby><cites>FETCH-LOGICAL-c426t-183b5c59f48c31bde73572034e8464a17801f4601a24523864d46bc3815c531d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1652948$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1652948$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Younis, M.F.</creatorcontrib><creatorcontrib>Ghumman, K.</creatorcontrib><creatorcontrib>Eltoweissy, M.</creatorcontrib><title>Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks</title><title>IEEE transactions on parallel and distributed systems</title><addtitle>TPDS</addtitle><description>Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive settings such as battlefield surveillance, border control, and infrastructure protection. Data confidentiality and authenticity are critical in these settings. However, the wireless connectivity, the absence of physical protection, the close interaction between WSNs and their physical environment, and the unattended deployment of WSNs make them highly vulnerable to node capture as well as a wide range of network-level attacks. Moreover, the constrained energy, memory, and computational capabilities of the employed sensor nodes limit the adoption of security solutions designed for wire-line and wireless networks. In this paper, we focus on the management of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem. Our scheme is termed SHELL because it is scalable, hierarchical, efficient, location-aware, and light-weight. Unlike most existing key management schemes for WSNs, SHELL supports rekeying and, thus, enhances network security and survivability against node capture. SHELL distributes key management functionality among multiple nodes and minimizes the memory and energy consumption through trading off the number of keys and rekeying messages. In addition, SHELL employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes by factoring the geographic location of nodes in key assignment. Simulation results demonstrate that SHELL significantly boosts the network resilience to attacks while conservatively consuming nodes' resources</description><subject>Clustering</subject><subject>collusion attacks</subject><subject>Combinatorial analysis</subject><subject>combinatorial optimization</subject><subject>Computer networks</subject><subject>Cryptography</subject><subject>Energy consumption</subject><subject>energy efficient design</subject><subject>Energy management</subject><subject>exclusion basis systems</subject><subject>key management</subject><subject>Keys</subject><subject>Large-scale systems</subject><subject>location-aware protocols</subject><subject>Management</subject><subject>Memory management</subject><subject>Network security</subject><subject>Networks</subject><subject>Protection</subject><subject>Resilience</subject><subject>secure group communications</subject><subject>Security</subject><subject>Sensors</subject><subject>Shells</subject><subject>Studies</subject><subject>Surveillance</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>1045-9219</issn><issn>1558-2183</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkM1Lw0AUxBdRsFaPnrwEL55S9-1XNsdSP7FqofUcNsmLpiZZ3U0o_e_dUkHw9IbhN49hCDkHOgGg6fVqcbOcMErVBKg6ICOQUscMND8MmgoZpwzSY3Li_ZpSEJKKEVnMbWH62nbxdGMcRjPb5nVneutq00RPuI2eTWfescWuj5bFRxBRZV00awbfo8MyWmLng_GC_ca6T39KjirTeDz7vWPydne7mj3E89f7x9l0HheCqT4OrXJZyLQSuuCQl5hwmTDKBWqhhIFEU6iEomCYkIxrJUqh8oJrCCkOJR-Tq_3fL2e_B_R91ta-wKYxHdrBZzpVjKYCeCAv_5FrO7gulMtSYAwoTViA4j1UOOu9wyr7cnVr3DYDmu3WzXbrZrt1g6MCf7Hna0T8Y5VkqdD8B1Yfc4g</recordid><startdate>20060801</startdate><enddate>20060801</enddate><creator>Younis, M.F.</creator><creator>Ghumman, K.</creator><creator>Eltoweissy, M.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20060801</creationdate><title>Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks</title><author>Younis, M.F. ; Ghumman, K. ; Eltoweissy, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c426t-183b5c59f48c31bde73572034e8464a17801f4601a24523864d46bc3815c531d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Clustering</topic><topic>collusion attacks</topic><topic>Combinatorial analysis</topic><topic>combinatorial optimization</topic><topic>Computer networks</topic><topic>Cryptography</topic><topic>Energy consumption</topic><topic>energy efficient design</topic><topic>Energy management</topic><topic>exclusion basis systems</topic><topic>key management</topic><topic>Keys</topic><topic>Large-scale systems</topic><topic>location-aware protocols</topic><topic>Management</topic><topic>Memory management</topic><topic>Network security</topic><topic>Networks</topic><topic>Protection</topic><topic>Resilience</topic><topic>secure group communications</topic><topic>Security</topic><topic>Sensors</topic><topic>Shells</topic><topic>Studies</topic><topic>Surveillance</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Younis, M.F.</creatorcontrib><creatorcontrib>Ghumman, K.</creatorcontrib><creatorcontrib>Eltoweissy, M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on parallel and distributed systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Younis, M.F.</au><au>Ghumman, K.</au><au>Eltoweissy, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks</atitle><jtitle>IEEE transactions on parallel and distributed systems</jtitle><stitle>TPDS</stitle><date>2006-08-01</date><risdate>2006</risdate><volume>17</volume><issue>8</issue><spage>865</spage><epage>882</epage><pages>865-882</pages><issn>1045-9219</issn><eissn>1558-2183</eissn><coden>ITDSEO</coden><abstract>Recent advances in wireless sensor networks (WSNs) are fueling the interest in their application in a wide variety of sensitive settings such as battlefield surveillance, border control, and infrastructure protection. Data confidentiality and authenticity are critical in these settings. However, the wireless connectivity, the absence of physical protection, the close interaction between WSNs and their physical environment, and the unattended deployment of WSNs make them highly vulnerable to node capture as well as a wide range of network-level attacks. Moreover, the constrained energy, memory, and computational capabilities of the employed sensor nodes limit the adoption of security solutions designed for wire-line and wireless networks. In this paper, we focus on the management of encryption keys in large-scale clustered WSNs. We propose a novel distributed key management scheme based on exclusion basis systems (EBS); a combinatorial formulation of the group key management problem. Our scheme is termed SHELL because it is scalable, hierarchical, efficient, location-aware, and light-weight. Unlike most existing key management schemes for WSNs, SHELL supports rekeying and, thus, enhances network security and survivability against node capture. SHELL distributes key management functionality among multiple nodes and minimizes the memory and energy consumption through trading off the number of keys and rekeying messages. In addition, SHELL employs a novel key assignment scheme that reduces the potential of collusion among compromised sensor nodes by factoring the geographic location of nodes in key assignment. Simulation results demonstrate that SHELL significantly boosts the network resilience to attacks while conservatively consuming nodes' resources</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPDS.2006.106</doi><tpages>18</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1045-9219
ispartof IEEE transactions on parallel and distributed systems, 2006-08, Vol.17 (8), p.865-882
issn 1045-9219
1558-2183
language eng
recordid cdi_crossref_primary_10_1109_TPDS_2006_106
source IEEE Electronic Library (IEL)
subjects Clustering
collusion attacks
Combinatorial analysis
combinatorial optimization
Computer networks
Cryptography
Energy consumption
energy efficient design
Energy management
exclusion basis systems
key management
Keys
Large-scale systems
location-aware protocols
Management
Memory management
Network security
Networks
Protection
Resilience
secure group communications
Security
Sensors
Shells
Studies
Surveillance
Wireless networks
Wireless sensor networks
title Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T18%3A22%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Location-Aware%20Combinatorial%20Key%20Management%20Scheme%20for%20Clustered%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20parallel%20and%20distributed%20systems&rft.au=Younis,%20M.F.&rft.date=2006-08-01&rft.volume=17&rft.issue=8&rft.spage=865&rft.epage=882&rft.pages=865-882&rft.issn=1045-9219&rft.eissn=1558-2183&rft.coden=ITDSEO&rft_id=info:doi/10.1109/TPDS.2006.106&rft_dat=%3Cproquest_RIE%3E2544609071%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=912210072&rft_id=info:pmid/&rft_ieee_id=1652948&rfr_iscdi=true