Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks

Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks

S. Kumar (Nehru Institute of Technology, Coimbatore, Tamil Nadu, India) and N. Nagarajan (Coimbatore Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India)
Copyright: © 2013 |Pages: 13
DOI: 10.4018/ijaci.2013100102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Wireless Sensor Networks (WSN) have appeared as one of the important fields at present due to their low-cost, self-organizing behavior, sensing ability in inconsiderate environments, and their huge application extent. One of the most challenging topics in relay network is security. The existing Network Topology Acquisition (NTA) processes for non transparent mode relay networks are not effective in providing the security features. At the same time, it is critical to provide privacy and validation in order to prevent information from relay networks. In the proposed system, key management is provided for privacy and simultaneously, validation for security measure is offered with relay nodes. Incorporated Network Topological control and Key management (INTK) scheme on the relay network provide the effective routing and security solution. INTK Scheme encompasses the incorporation of security and routing, active security, robust re-keying, low complexity and the multiple intensity of encrypt features in relay networks. Security scheme is designed with consideration of the multi cluster based topology control through a multiple intensity keying. The proposed security scheme has low communication energy due to its multi cluster-key executive. INTK Scheme acquires results on 4.5% improved security level with lesser execution time and communication energy consumption. A variety of numerical parameters are computed using ns2 simulator on existing NTA processes for non transparent mode relay networks and proposed INTK Scheme. INTK is highly realistic because it is intended to incorporate routing layer and security protocol without sacrificing energy.
Article Preview

1. Introduction

More recently, a pattern shift occurred from traditional macro sensors to the micro-sensors used in Wireless Sensor Relay Networks. A Wireless relay network is comprised of wireless sensor modules, called nodes. Each relay node is made up of a few key components such as a micro-sensor to decide the preferred event; a low-cost application-specific microprocessor; memory to store information; a battery; and a transceiver for communication between the node and the rest of the network.

Due to the nature of wireless communication, data are available in the air for any third party to acquire. The security feature along with the ad-hoc nature, irregular connectivity, and resource limitations of relay network result in a number of design challenges. For example, the accessibility of data to third parties causes numerous disasters in many military or homeland security applications. Therefore, it is critical to provide privacy and authentication while preventing data information from being compromised. Traditionally, security is provided through public key based protocols. However, these network topology controls engage great memory bandwidth and composite mechanism.

The incomplete resources of wireless relay network create a category of security schemes unsuitable for implementation. Thus, security provides the unique features and resource limitations of relay network. Currently, very incomplete work has been done on relay network security. The original work on securing relay network has an end-to-end transmission which requires time synchronization among sensors. A significant improvement for achieving broadcast validation of any messages sent from the base-station (BS).

One of the common drawbacks of those sensor network security schemes is that they do not combine security with energy-efficient hierarchical routing architectures. The wireless sensors only want to account data to the nearby sensors, it causes much overhead if constructs secure links between any two relay nodes. Classically, to reduce routing overhead a relay network is able to self-organize itself as a multi-cluster architecture after sensor deployment. A multi-cluster includes a group of neighboring nodes where one of the group nodes is selected as Cluster Head (CH). The multi-cluster use parameters such as sensor energy level, mobility, position to form multiple clusters and determine CH. Data is combined by the CH that removes duplicated or redundant information. The aggregation is also being realized by having nodes closer to the CH process the data coming from nodes further than away through eavesdrop.

NTA process set channel ID for mobile stations, and time taken to accept a new mobile station are mainly focused (Satish Kumar et al., 2012). The mobile stations which are in the coverage area of the base station are given initial preference, and those outside coverage areas are allocated channel ID through relay stations. Existing work overlooks the idea that security scheme should be effortlessly incorporated with the special characteristics of relay network architecture, especially routing protocols. In particular, most of the existing relay network security strategies focus only on key management and security algorithms. For example, all existing key pre distribution schemes try to establish pairwise keys between each pair of nodes. However, most sensors do not necessitate setting up a direct protected channel with sensors multiple hops. Since, relay network use hop-to-hop communication techniques to achieve long distance transmission.

Most of traditional sensor network security schemes presently center on end-to-end security issues and ignore relay network topology control details. They do not believe the low energy routing structural design and merely presume the entire network uses tree or flat based topology. It is necessary and beneficial to take cluster-based communication architecture into consideration to reduce key management overhead in secure relay network.

Proposed INTK incorporate the cluster-based routing architecture and key management in the relay node for enhanced reliability and security. INTK scheme achieves security in relay network topology control with routing procedure. Performance results show that the proposed multi clustering based intensity keying/re-keying scheme significantly save energy. It is a dynamic, distributed protocol where security is providing independent of central control. An additional significant feature of INTK scheme is that it has a robust broadcast and it recovers even the multiple key losses.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 8: 4 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing