International Journal on Advanced Computer Theory and Engineering (IJACTE) _______________________________________________________________________________________________ Mobility Based Key Management Scheme of Wireless Sensor Network 1 T.Lalitha, 2G.M.Kadhar Nawaz, 3T.Dharaniselvan Sr. Asst. Prof/MCA, Director/MCA, MCA Sona College of Technology,Salem-5. Email: [email protected], [email protected], [email protected] Abstract— In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pair wise keys for nodes are generated by the sink through Exclusion Basis Systems (EBS). Whenever a node moves from currently connected cluster to another in the network, the mobility based key management scheme is triggered. The sink verifies the authenticity of roaming node and allocates it to a nearby cluster. New pair wise keys are generated and transmitted to the roaming node through newly connected cluster head. Further, a key organization technique is presented to ensure the forward and backward secrecy of nodes. The proposed technique is simulated in NS2 and simulation results show the efficiency of our technique. Index Terms—Mobility,Key Encryption Management, head selection algorithm, each node decides if it is capable of serving as a cluster head based on the following selection criteria: (i) High Energy Resources, (ii) Wide Communication Range and (iii) High Processing Capacity. For the authentication process, the encryption mechanism is carried on. When the selection criteria are satisfied by a particular node, it is capable of being the cluster head. So, this node, Ni broadcasts a Cluster head beacon (CH_BEACON) packet. We assume that each node is deployed with a key called the primary key (Kpri) by the sink. This key is used as a global key for communicating data with other nodes and the sink initially. Thus, the CH_BEACON packet is encrypted with the primary key, Kpri. Cluster, I. INTRODUCTION A network comprising of several minute wireless sensor nodes which are organized in a dense manner is called as a Wireless Sensor Network (WSN). Every node estimates the state of its surroundings in this network. The estimated results are then converted into the signal form in order to determine the features related to this technique after the processing of the signals. Based on the multi hop technique[3], the entire data that is accumulated is directed towards the special nodes which are considered as the sink nodes or the Base Station (BS). The user at the destination receives the data through the internet or the satellite via gateway. The use of the gateway is not very necessary as it is reliant on the distance between the user at the destination and the network [1]. II. MOBILITY MANAGEMENT FOR KEYING SCHEME A. Cluster Formation In wireless sensor network, after the nodes are deployed in the physical environment, they first report to the base station their physical locations, and then the network starts to select cluster heads. According to the cluster When the neighboring nodes Si receive this message, a cluster head reply (CH_REPLY) message is sent to the node, Ni by the nodes which intend to join the cluster. The reply message contains the ID and the response content Ack. If the number of reply messages received by Ni is greater than a threshold Rth, then Ni can be selected as the cluster head, CH. Finally, the cluster head assigns IDs to all its member nodes that intend to join the cluster. After the clusters are formed in the network, the CH sends the information of its members like <cluster id, member id> to the sink. The sink allots a cluster key, KCH to every cluster in the network. The diagram in figure-1 illustrates the cluster formation. In that, X1, X2 and X3 represent the cluster member information that is transmitted to the sink by cluster heads. After getting the cluster key from the sink, each CH receives the pair wise key set which is based on Exclusion Basis System (EBS) [2]. The EBS key set includes the pair wise keys namely _______________________________________________________________________________________________ ISSN (Print): 2319-2526, Volume -3, Issue -4, 2014 28 International Journal on Advanced Computer Theory and Engineering (IJACTE) _______________________________________________________________________________________________ Pij for communication between the CH and its member, and also the pair wise keys, PHii’ for communication between the CHs encrypted by the cluster key. The intra and inter cluster communication are described at length in our previous paper [1]. (ii) On receiving C-REQ message, the sink checks cluster information of MSi to ensure its legitimacy. If MSi is proved to be the valid sensor then the sink verifies the MAC using Kpri. On successful verification of MAC, the sink generates the pair wise keys (Pij and PHii) using Exclusion Basis System (EBS). Pij and PHii keys are used for inter and intra cluster communication respectively. (iii) The sink generates a random number Rn+1 and constructs a support message to the cluster nearby MSi. This support message comprises of MS_ID, pairwise keys, cluster ID and random number (Rn and Rn+1) generated by MSi and the sink respectively. The content of support message is encrypted using cluster key (KCHi). The support message is transmitted to the nearby cluster head (CHi+1). The Sink The Cluster Head SupportMessage Support Message: SinkID, MS ID, CH , E i B. Mobility Based Key Management We consider a sensor network with a large number of sensor nodes that are randomly moves within the network. Hospital environment and nuclear power plants are some examples for this kind of distributed sensor network. When a sensor node moves from the transmission range of one cluster to another, then it invokes the mobility management scheme. This scheme function as follows, (i) Let MSi be the sensor node that moves from cluster Ci of the network. It first forwards the C-REQ (cluster request) message to the sink. (Figure-2) The C-REQ message includes the ID of MSi, sink ID, old cluster head id (O-CH-ID) and the random number (Rn) produced by MSi. This can be denoted as, C REQ MSi The sink C-REQ: MS , SinkID, O CH ID || R i n || MAC K pri , MS i || SinkID || Rn The Message Authentication Code (MAC) is generated to the content of C-REQ message using the key Kpri. Here, Kpri is the global key . K CHi 1 P ij , PH ii , Rn , Rn1 (iv) Apart from transmitting support message to the new cluster head, an intimation message is transmitted to the old cluster head of MSi. The intimation message informs the cluster head about the removal of node MSi to another cluster head. (v) While receiving the support message, the CHi+1 decrypts it using its cluster key and retrieves the pairwise keys. And then it forwards an approval message to MSi. It includes random keys generated by MSi and the sink, pairwise keys, node ID and cluster head ID. MSi Cluster Head Approval Approval: , MS ID, CH , R , R i n n 1 , MAC Pij , PH ii (vi) Now, MSi verifies the random number Rn with its original random number and verifies the MAC using Kpri and retrieves the pair wise keys. Finally, the MSi joins with the new cluster by transmitting back ACK message to the new cluster head. (vii) The overall procedure of mobility based key management scheme is given below in algorithm-1. Algorithm-1 1. Assume MSi be the roaming sensor node 2. Let C-REQi be the cluster request message forwarded by MSi 3. MSi forwards C-REQi to the sink 4. The sink checks the authenticity of MSi through checking its old cluster information 5. If (Authentication is successful) then 5.1 MAC value is verified _______________________________________________________________________________________________ ISSN (Print): 2319-2526, Volume -3, Issue -4, 2014 29 International Journal on Advanced Computer Theory and Engineering (IJACTE) _______________________________________________________________________________________________ 5.1.1 If (MAC value of MSi is successful) then (a) The sink generates Pij and PHii using EBS (b) The generated keys are transmitted to the cluster head nearer to MSi Both the sink and cluster heads maintain the table called key table (K-Table). The format of K-table of the sink and cluster heads are given below in table-1 and table-2 respectively (c) The cluster head sends approval message to Clus ter Nam e MSi (d)MSi joins in the new cluster by forwarding back acknowledgement message Clus ter Hea d ID Clus ter key Key Lifeti me Clust er Mem ber ID Pairw ise Keys Keys Lifeti me 5.1.2 Else if (MAC value is failed) then Table-1 K-Table of the Sink (a) Goto Step- 6 6. Else if (Authentication is unsuccessful) then Cluster Member ID (a) C-REQ message is dropped (b) The corresponding compromised node node is considered as 7. End if Pairwise Keys Keys Lifetime Table-2 K-Table of Cluster Head Whenever keys are updated by the sink they are modified in K-Table of sink and K-Table of cluster head. Upon the expiration of key lifetime, new key is generated and updated. When a cluster member moves from the connected cluster to another, the corresponding entry is completely deleted from K-table of sink and cluster head. Thus, consider when a cluster member (say node 3) moves from cluster head (CH1) and joins another cluster head (CH2). After a time interval tn, assume that node 3 wishes to join again in CH1, at this instant, node 3 cannot be included in CH1 using its old pairwise keys. It is considered as a new connection rather than rejoining operation. By doing this, the proposed key organization technique offers forward and backward secrecy in the network, where it is impossible for the malicious nodes to perform their action. Consider the mobility based key management illustration given in Figure-3. In that, consider node CM8 of Cluster C2 roams away from the transmission range of CH2. At first, CM8 transmits a C-REQ message to the sink. By receiving C-REQ, the sink checks the authenticity of that node and generates a pair wise keys for inter and intra cluster communications. The generated keys are included in the support message and forwarded to the nearby cluster of CM8. In figure-3, the nearby cluster is C3 (i.e) CH3. Now, CH3 transmits an approval message to CM8 and an ACK message is forwarded back to CH3 by CM8. Finally, CM8 joins C3 and it became a member of CH3. III. KEY ORGANIZATION To organize keys effectively and make available freshness of keys, this paper presents a key organization technique. The proposed technique defines the life time for every key such as cluster key and pairwise keys. Upon the expiration of lifetime of keys, it invoke rekeying scheme by sending key request to the sink. While receiving the request, the sink generates the new key through EBS and forwards it to the cluster head by encrypting using old secret key. Upsides of Proposed Technique (i) The technique effectively handles the challenge of mobility of nodes in key management system of cluster based wireless sensor networks. (ii) Since, cluster keys are transformed periodically; the technique offers more security. (iii) In addition, forward and backward secrecy is assured. (iv) The new addition of lifetime of keys introduces dynamic changes in keys and freshness of keys. Thereby, it guarantees that malicious user is precluded in the network. IV. NETWORK SECURITY IN SENSOR NETWORKS In wireless channels, the communication is not completely secure and is subjected to security hazard. In the wireless channels, the possible security threat can be divided into two threats: inside threat and outside threat. In case of outside threat in the sensor network, the attacker does not possess control over the cryptographic _______________________________________________________________________________________________ ISSN (Print): 2319-2526, Volume -3, Issue -4, 2014 30 International Journal on Advanced Computer Theory and Engineering (IJACTE) _______________________________________________________________________________________________ materials. Whereas in case of the inside threat, the attacker will be possess some key materials and trust of some sensor nodes. Compromising the sensor nodes is an easy task due to the absence of the expensive tampering resistant hardware. Even if it possesses the tampering resistant hardware, it may be very reliant. Modification, forging and discarding the messages is possible in case of a compromised node [2].In vulnerable locations, maintaining the security of the sensor nodes is a major task. In WSN, the encoding and the authentication of the communication carried out is necessary, to ensure security. Key Management in Wireless Sensor Networks. Use of the pair wise keys between sensor nodes is the necessary requirement of the WSN for ensuring security. The trusted-server scheme, the self-enforcing scheme, and the key pre distribution scheme are the three classes of the key agreement schemes. A trusted server is assumed to exist in the case of trusted-server scheme for the establishment of keys between the nodes. But in case of distributed sensor networks, trusted server scheme is not appropriate due to the difficulty in developing a trusted network. Asymmetric cryptography, like that of public key certificate is utilized in the self enforcing scheme. But for sensor networks, use of the public key algorithm is inappropriate due to the restricted amount of power and resources for computation in the minute sensor node. In the key pre-distribution schemes, loading of the keying materials takes place at a prior basis in the sensor nodes [3]. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pairwise keys for nodes are generated by the sink through Exclusion Basis Systems (EBS). Whenever a node moves from currently connected cluster to another in the network, the mobility based key management scheme is triggered. The sink verifies the authenticity of roaming node and allocates it to a nearby cluster. New pairwise keys are generated and transmitted to the roaming node through newly connected cluster head. Further, a key organization technique is presented to ensure the forward and backward secrecy of nodes. The proposed technique is simulated in NS2 and simulation results show the efficiency of our technique. REFERENCES [1] Lalitha,.T “Energy Efficient Cluster based Key Management & Authentication Technique for Wireless Sensor Networks”, [2] M. Eltoweissy, M.H. Heydari, L. Morales and H. Sudboorough,“Combinatorial Optimization of Group Key Management”, ACM, Journal of Network and Systems Management, Vol-12, Issue-1, pp-33-50, 2004 [3] G. Jolly, M. Kuscu, P. Kokate, and M. Younus, “A International Journal Of Intelligent Control And Systems, VOL. 13, NO. 2, JUNE 2008Low-Energy Key Management Protocol for Wireless Sensor Networks,” in: Proceedings of the 8th IEEE Symposium on Computer and Communications (ISCC), Antalya, 335-340, 2003. V. CONCLUSION In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. _______________________________________________________________________________________________ ISSN (Print): 2319-2526, Volume -3, Issue -4, 2014 31
© Copyright 2026 Paperzz