Adaptive Hierarchical Key Structure Generation for Key Management in Wireless Sensor Networks using A*

Wireless Sensor networks have a wide spectrum of civil and military applications that call for secure communication such as the terrorist tracking, target surveillance in hostile environments. For the secure communication in these application areas, we propose a method for generating a hierarchical key structure for the efficient group key management. In this paper, we apply A* algorithm in generating a hierarchical key structure by considering the history data of the ratio of addition and eviction of sensor nodes in a location where sensor nodes are deployed. Thus generated key tree structure provides an efficient way of managing the group key in terms of energy consumption when addition and eviction event occurs. A* algorithm tries to minimize the number of messages needed for group key management by the history data. The experimentation with the tree shows efficiency of the proposed method.





References:
[1] Pietro, R. D., Mancini, L.V., Jajodia, S., "Providing secrecy in key
management protocols for large wireless sensors networks," AdHoc
Network 1 (2003) 455-468
[2] Lin Yuan, Gang Qu., "Design Space Exploration for Energy Efficient
Secure Sensor Network," IEEE ASAP (2002) 88-97.
[3] Mohamed Eltoweissy, Ashraf Wadaa, Stephan Olariu, Larry Wilson,
"Group Key management scheme for large-scale sensor networks," Ad
Hoc Network 3 (2005) 668-688.
[4] Laurent Eschenauer, Virgil Gligor, D., "A Key Management Scheme for
Distributed Sensor Networks," CCS-02 (2002).
[5] Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E., "A Suvey on
Sensor Networks," IEEE Communications Magazine 40 (2002) 102-114.
[6] Prasan Kumar Sahoo, Jonathan Jen-Ron Chen, Ping-Tai Sun., "Efficient
Security Mechanisms for the Distributed Wireless Sensor Networks,"
ICITA-50 (2005).
[7] Mohamed Eltoweissy, Mohamed Younis, Kajaldeep Ghumman,
"Lightweight Key Management for Wireless Sensor Networks," IEEE
International Conference Performance on Computing, and
Communications (2004) 813-818.
[8] Carman, D., Kruus, P., Matt, B., "Constraints and approaches for
distributed sensor networks security," NAI Technical Report (2000).
[9] Jolly, G., Kuscu, M., Kokate, P., "A hierarchical key management
method for low-energy wireless sensor networks," UMBC Online
Document. (2002).
[10] Chan, H., Perrig, A., Song, D., "Random key pre-distribution schemes for
sensor networks," IEEE 2003 Symposium on Security and Privacy
(2003).
[11] Pottie, G. J., Kaiser, W. J., "Wireless Integrated Network Sensors,"
Communications of the ACM 43 (2000) 51-58.
[12] Wallner, D., Harder, E., Agee, R., "Key management for multicast: Issues
and architectures," IETF (1999) RFC 2627.
[13] Jiang, Q., Manivannan, D., "Routing protocols for sensor networks,"
CCNC (2004) 93 - 98.
[14] Al-Karaki, J.N., Kamal, A.E., "Routing techniques in wireless sensor
networks: a survey," Wireless Communications Vol. 11 (2004).
[15] Chien-Chung Su, Ko-Ming Chang, Yau-Hwang Kuo, Mong-Fong Horng,
"The new Intrusion Prevention and Detection Approaches for
Clustering-based Sensor Network," WCNC (2005) 1927-1932.
[16] Zhu, S., Setia, S., Jajodia, S., "LEAP: efficient security mechanisms for
large-scale distributed sensor networks," ACM CCS (2003) 27-31.
[17] Wong, C., Gouda, M., Lam, S., "Secure group communications using key
graphs," IEEE/ACM Transactions on Networking 8 (2000) 16-30.
[18] Nils J. Nilsson., "Artificial Intelligence: A new synthesis," Morgan
Kaufmann Publishers (1998).
[19] Lin, C., Gerla, M., "Adaptive clustering for mobile wireless networks,"
Journal on Selected Areas of Communication Vol.15 (1997).
[20] Younis, M., Youssef, M., Arisha K., "Energy-Aware Routing in
Cluster-Based Sensor Networks," MASCTS (2002) 129-136.