An Energy Efficient Cluster Based Group Key Management Scheme using Elliptical Curve Cryptography in Wireless Sensor Network
-
2018-11-05 https://doi.org/10.14419/ijet.v7i4.17987 -
Cluster Head, Energy Efficient, ECC, Fuzzy Logic, Group Key, Security, WSN. -
Abstract
Group communication with secure authentication in wireless sensor network can be attained by public key cryptography. Security is a measure concern in WSN. Deployment of many key during cluster formation is a important task for secure group communication. To realize this concept, we proposed an energy efficiency group key management using cluster head formation. In existing energy based cluster head selection, each node select cluster head to its neighbors. This paper presents fuzzy logic rules to select cluster head based on the energy cost, node mobility, received signal strength, residual energy model, number of neighbors, and distance of the nodes from the base station. Cluster head take the role of key manager. Moreover, selection of cluster head saves the energy of each node due to lightweight framework and easy authentication can be achieved. This group key is generated by the cluster head and communicated to other members through a secure channel that uses public key cryptography. Due to the resource constraints of wireless sensors, ECC based hierarchical cluster key management scheme is proposed for its small size of keys with same security level with compare to RSA. The technique proposed in this work uses digital signature scheme and encryption-decryption mechanisms using elliptic curve cryptography (ECC). The result shows that the proposed work is faster than other work.
Â
Â
 -
References
[1] J. Zhang and V. Varadharajan. Wireless sensor network key management survey and taxonomy.Journal of network and Computer Applications,vol.33,no. 2,2010, pp.63-75.
[2] W.Heinzelman,A. Chandrakasan, and H. Balakrishnan. energy-efficeint communication protocol for WSN.In Proc. Of the 33rd Hawaii international Conference on System Sciences,Washington 2000.
[3] A.A. Aziz, Y.A. Sekercioglu, P. Fitzpartrick and M.Ivanovich.A Survey on Distributed Topology control techniques for Extending the Lifetime of Battery Powered wireless sensor Networks.Communications Surveys & Tutorials, IEEE, vol. 15, (2013),pp,121-144.
[4] N.M.Saravana Kumar and Dr T.Purusothaman. SEGKMS:Scalable and Efficient Group Key Management Scheme in Multicast Networks.European journal of 2012.
[5] Pitipatana, S., A. Nirwan. Elliptic Curve Cryptosystem-Based Group Key Management For secure Group Communications, IEEE Military Communications Conference doi: 10.1109/MILCOM. 2007.pp. 445- 502.
[6] S.Jabeen Begum and Dr.T.Purosothaman. A New Scalable and Reliable Cost Effective Key Agreement Protocol for Secure Group Communication.Journal of Computer Science 7(3): 2011, pp.328-340.
[7] M. Rahman and K. El-Khatib. Private key agreement and secure communication for heterogeneous sensor networks.J. Parallel Distrib.Comput.,vol. 70, no. 8, pp. 858–870, 2010.
[8] S Jabeenbegum, T Purusothaman. A Cluster Based Cost Efective Contributory Key Agreement Protocol for Secure Group Communication.IEEE Second International conference on Computing, Communication and Networking, 2010,pp,1-12.
[9] Priyanka laiswal, Abhimanyu Kumar, Sachin Tripathi . Design of secure group key agreement protocol using elliptic curve cryptography.High Performance Computing and Applications (ICHPCA), International Conference,1 – 6. December 2014,pp. 22-24.
[10] D. Wallner, E. Harder and R. Agee.Key Management for Multicast: Issues and Architectures.Technical Report RFC 2627, Internet Engineering Task Force,1999.
[11] Wong, C.K., M.Gouda and S.S.Lam. Secure Group Communications Using Key Graphs.Proc. ACM SIGCOMM. Vancouver, Canada, September 1998, pp. 68–79.
[12] Sherman, A.T. and McGrew, D.A.Key establishment in large dynamic groups using one-way function trees,IEEE Trans. Softw. Eng.29, 2003,pp. 444–458.
[13] Heeyoul Kim, Seong-min Hong,H.Yoon and J.W.Cho.Secure Group Communication with Multiplicative One-way Functions. Proc IEEE International Conference on Information Technology:-Coding and Computing,2005, pp. 1-6.
[14] Yi-Ruei Chen and Wen-Guey Tzeng. Efficient and Provably- Secure Group Key Management Scheme Using Key Derivation.IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications,2012,pp. 295-300.
[15] Lin, I.C., S.S. Tang and C.M. Wang . Multicast key management without rekeying processes.Comput. J., 53: 2010,pp. 940-950.
[16] R.L. Rivest,A.Shamir,and L. Adleman.A method for obtaining digital signatures and public-key cryptosystems,Commun. ACM, 21, 1978,pp.120–126.
[17] Saravanan, K. and T. Purusothaman. Efficient Star Topology based Multicast Key Management Algorithm.Journal of Computer Science 8 (6),2012,pp. 951-956.
[18] M.Shainika and Mrs.C.Hema.Cluster Based Mobile Key Management Scheme to Improve Scalability and Mobility in Wireless Sensor Networks.National Conference on Research Advances in Communication, Computation, Electrical Science and Structures (NCRACCESS- 2015),pp.22-26.
[19] Jyothi Metan and K N Narasimha Murthy. Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network.International Journal ofComputer Applications,Volume 117 –No.12, May 2015,pp.0975 – 8887.
[20] X. Wanga, P. Lia, Y. Suia, and H. Yanga. A Hexagon-based Key Pre-distribution Scheme for Wireless Sensor Networks. Journal of Information & Computational Science,Vol. 11 (8), 2014,pp. 2479- 2491.
[21] X. Zhang, J. He, and Q. Wei. EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks.EURASIPJ Wireless Commun. Netw.,vol. 2011, Jan 2011,pp. 1–11.
[22] A Naureen, K Kim, F Ahmed. Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks.IEEE Commu-nication, 2008, pp.163-167.
[23] Burnett, S. and Paine, S., RSA Security’s Official Guide to Cryptography,RSA Press,2001.
[24] Y. Kim, A.Perrig and G.Tsudik. Simple and faulttolerant key agreement for dynamic collaborative groups.Proc. 7th ACM Conference on Computer and Communications Security, ACM Press, 2000, pp.235–244.
[25] Bing Wu, Jie Wuand Yuhong Dong. An efficient group key management scheme for mobile ad hoc networks.Int. J. Security and Networks,2008.
[26] V.Vasudevan and Joe Prathap ,P.M .Analysis of the various key management algorithms and new proposal in the secure multicast communications research paper,2009.
[27] Usham Robinchandra Singh, Sudipta Roy, Soram Ranbir Singh. A Brief Analysis on Key Management Schemes Using Elliptic Curve Cryptography in Wireless Sensor Network, International Journal of Engineering Science Invention,Volume 3 Issue 7, 2014, pp.57-70.
-
Downloads
-
How to Cite
Robinchandra Singh, U., & Roy, S. (2018). An Energy Efficient Cluster Based Group Key Management Scheme using Elliptical Curve Cryptography in Wireless Sensor Network. International Journal of Engineering & Technology, 7(4), 4930-4938. https://doi.org/10.14419/ijet.v7i4.17987