1.3 Advantages of group key management

Group Key Management for AVL Distributed Sensor
Networks
Shobha K
Sangeetha G M
Dr. Nalini N
Computer Science Engineering
Department,
Nitte Meenakshi Institute of
Technology, Yelahanka,
Bangalore,
Computer Science Engineering
Department,
Nitte Meenakshi Institute of
Technology, Yelahanka,
Bangalore,
Computer Science Engineering
Department,
Nitte Meenakshi Institute of
Technology, Yelahanka,
Bangalore,
[email protected]
[email protected]
om
[email protected]
om
ABSTRACT
Wireless sensor networks (WSNs) can be used by the military
for a number of purposes such as observing or tracking the
enemies and force security. Unlike commercial WSNs, a
planned military sensor network has different precedence
requirements for military usage. Especially in the remote
large-scale network security, topology, self-configuration,
network connectivity, maintenance, and energy consumption
are the challenges. Deployments of distributed wireless sensor
nodes are a result of wide range of applications, effortlessly
captured by opponent, resulting in the leakage of key. Also
the distributed Sensor Networks (DSN) is largely used in
areas of surveillance. Tracking and Traffic monitoring which
requires protected communications between the sensor nodes.
In this paper, we have implemented a Group key protocol and
computed partial key delivery time and Group key delivery
time for AVL tree. The performance of partial key delivery
time and Group key delivery time are for AVL tree are
compared with partial key delivery time and Group key
delivery time of binary tree.
Hence forth the methods by which we can enhance the
capability of network security in terms of authentication,
reliability and confidentiality to a DSNs must be taken under
considerations. Therefore to support the security series one
needs cryptographic key management techniques that
provides the secure communication amongst the nodes in a
network
Group key management protocol service has the following
advantages (a) virtually invisible to operator (b) no central
key distribution site is needed (c) only group member will
have the key (d) sender or receiver oriented operation (e) can
also make use of multicast communication protocols. Alone
key management services are difficult to meet the security
goals of confidentiality, reliability, integrity and
authentication to prevent from the security attacks on a DSNs.
Therefore group key management would serve the purpose of
achieving the security goals by optimizing the services of the
key management and also to define key distribution
functionalities.
Keywords
Wireless Distributed Sensor Network, AVL,
management, root node, child node, key distribution.
Key
1. INTRODUCTION
Recommender Sensor networks are composed by a large
number of devices. The sensor placement does not need to be
engineered or predetermined; random deployment on
inaccessible terrains and it implies self-organizing
capabilities. The sensor network applications are broadly
classified into these sectors (a) environmental/health
monitoring where in is used in habitat monitoring, integrated
biology, structured monitoring and (b) commercial control,
interactive where in is used in product quality monitor,
intrusion detection and so on. The sensor nodes in a network
are usually scattered in a field, sensors route toward the sink,
sensors relay on each other for multi-hop and sink
communication to user through internet or satellite. Therefore
it’s more vulnerable to either passive or active attacks which
include the unauthorized access of reading a message of a file,
modification of messages in a file and so on.
1.1 Key management
Key management is an important task in DSN and the
research work is been extensively carried away in this area.
Key management is the management of cryptographic keys in
a cryptosystem, which includes handling with the generation,
exchange, storage, use and replacement of keys and also
includes cryptographic protocol design and other relevant key
design protocols.
Successful key management is critical to the security of a
cryptosystem, since it may use different types of keys, with
some systems using more than one. They may include
symmetric keys or asymmetric keys also both. In asymmetric
keys there are two distinct keys that are mathematically linked
whereas symmetric keys involve identical for both encryption
and decryption of a message. The major issue in the key
management system is length of key use and therefore
requires frequency of replacement because this increases any
attackers required effort. The keys should be frequently
1
changed as this also decreases the loss of information as the
number of stored encrypted message which will become
readable when a key is found will decrease as the frequency
of key change increases. Therefore there are many challenge
concerned with the key management namely (a) complex
management: managing the methodologies of encryption keys
in bulk (b) security issues: vulnerability of keys from outside
hackers and malicious insiders (c) data availability: ensuring
data accessibility for authorized users (d) scalability:
supporting multiple database, applications and standards (e)
governance of data: control and protection for data.
1.3.1
Therefore without proper management this methodology
(key management) can become complex, costly and risk
prone. The key management challenges will only increase
over time as cryptography is employed more broadly within
as organization or in an infrastructure, driving up the number
and diversity of keys to be managed. Hence individuals
responsible for implementing cryptographic security needs to
become familiar with different approaches to key
management, key managements best practices and technology
alternatives for implementing these methodologies/ practices.
The dynamic group key distribution or transport is also known
as centralized group key management this protocol is a group
key establishment technique where a single entity which is
either known as centralized authority creates or otherwise
obtains a secret value and securely transfer it to the other
members. This practice leaves open whether the central
authority may be a group member. It is also possible to have
some trusted third party (TTP) as the central authority. Hence
a group key management protocol seeks to decrease the
storage requirements, computational power and frequency of
bandwidth utilization on both client and server sides. Hence
forth to optimize the performance of the centralized group key
management protocol they employ hierarchal fashion
schemes.
1.2 Group key management
Group key management is fundamental for a various security
mechanisms in a group communication and as well as group
applications. It allows n>=2 principals to agree upon a
common secret key this can further be classified into group
key agreement, where all the principals participate in the
construction of the key, and the group key distribution, where
the key is chosen by a single principal and is then securely
communicated to the others. Both these techniques can be
analyzed in the context of either static or dynamic groups.
The dynamic key establishment is rather known as group key
management (GKM), as it involves not only the initial key
establishment, but also efficient key management when the
group members join or leaves the group. Therefore, the
changes in membership may require that the group key is
refreshed. Such a refreshing procedure prevents a joining or
leaving group member from decoding messages exchanged in
the past or future, when he or she has recorded earlier
messages in their encrypted form that is either encrypted with
the old or new keys. However, establishing and managing the
group key among the valid member is a complex problem.
Group key management also refers to the set of
methodologies to create, maintain and destroy the group key.
The group key management on peer group is very
challenging, since (a) the group key has to be changed when a
new user joins or an existing group member leaves the group
in order to make sure strong security is maintained (b) it must
coordinate with other neighbour networks in order to assure
that the sub groups can still communicate securely and (c) to
assure and efficient in communication and computation.
Group key management protocols can be
classified into two main classes:
(1) centralized group key management protocols
(2) distributed group key management protocols
Centralized group key management protocols
Distributed group key management protocols:
Dynamic group key exchange is also known as decentralized
or distributed group key management. This protocol is a group
key establishment technique where a shared secret key is
derived by two or more group members as a function of the
information contributed by each of them, so that no group
member can predetermine the resulting value. Therefore, the
main difference from centralized group key management
protocols is that the no group member is allowed to choose
the group key on behalf of the whole group. However, in
many adversary protocols the processing time and
communication requirements increases parallel with respect to
members in a group.
The basic idea here is that every member can compute a group
key so that every other members keys in a tree are known.
After any group membership event, every other member
without any constraints adds or leaves (remove) some nodes
related with the events, and invalidates all keys. Here, both
group key management establishment techniques can be
analyzed in context of either static or dynamic groups. It is
always possible to establish the group key for the modified
group key restarting the protocol. However, this may be
inefficient and tedious if groups are in large in number and
also if the protocol is expensive in regards of communication
and computational costs.
2
5.
1.3 Advantages of group key management:
1.
2.
3.
4.
It allows multicasting.
It provides better robustness than networking
keying.
It is flexible.
It supports adjustable scalability.
1.4 Security properties of group key
management:
1.
2.
3.
4.
Perfect forward secrecy- it ensures when a key is
performed its actions, a group member cannot
decipher past messages encrypted with any of the
older data encryption keys(DEK). The messages
protected by encryption using a chosen key which in
the context of group communication is known as
data encryption key or session key.
Group forward secrecy: it prevents a leaving or
expelled group member from continued access to
group communications.
Group backward secrecy: it prevents a new group
member from decoding messages exchanged before
him / her joining the group.
Collusion resistance: it ensures that even all the
past group members who presently does not belongs
to the group collude, they fail to decipher group
messages that are encrypted with the current DEKs.
Whenever a node joins or leaves a DSN the Group
Key Changes. This is described by Ju-Hyung Don et
al [8].
3. Proposed model
In this section, we describe the implementation of the Group
Key Management protocol for an AVL Tree distributed
Sensor Network with multiple level sensor nodes and relay
nodes. This Group Key protocol is described by Biswajitb
Panja[]. The leaf sensor nodes collect data and forward it toits
parents. Each parent aggregates the data and forwards that to
the root node. The topology of the AVL tree DSN and the
identification of the nodes is as shown in figure (1)
2. RELATED WORK
1.
2.
Suresha; Dr Nalini [1] they have computed Group
Key for a Binary Distributed Sensor Network,
where all the nodes contribute their partial key in
computing Group Key. This is done in order to
ensure the secure communications of Distributed
Sensor Networks using a group key protocol and
computed partial key delivery time as well group
key delivery time. Therefore, the group key
provides most important security services such as
authentication, confidentiality and also is more
resilient to node capturing.
Biswajit Panja et al [7] provides security
information in DSN, as it is one of the most
important concept. They also describe preventionary
measures for active and passive attacks and
implementations of security services such as
confidentiality and authentication in DSN through
Group Hey Management protocols.
3.
The hierarchical sensor networks helps in providing
different access control policies at different levels
and Group Key Management Protocol provides
secured communication by removing comprised
nodes. The above issues are explained by Madaria
S.K et al [7].
4.
Bharat Bhargava et al [5] describes Hierarchical
Sensor Networks, and the generation of Partial Keys
and Group Key Computation in Distributed Sensor
Networks.
Figure (1): AVL Tree distributed Sensor Network
3.1 Partial key Computation
In this section, we explain the computation of partial key in
every node of DSN. The root sends a request message to the
leaf nodes to compute partial keys. The parent nodes compute
the partial keys by using the partial keys of children. As leaf
nodes don’t have any decedents, they generate random
numbers as their partial keys.
The parent of leaf node compute the partial keys using
function f (kl, kr) = a kl⊕kr mod q, where q is the prime
number a is a prime root and k1 and kr are partial keys. Using
bottom up approach, all non leaf nodes can generate their
partial keys.
3
We have selected a group key management protocol, where
all members contribute their partial keys for computing group
key.
3.3 Group key computation
The main purpose of the function f is to produce new partial
keys, using partial keys of children.
The function f must have the following properties.
In this process of calculating Group key, every sensor node
shares its partial key. The root node accumulates all partial
keys for the computation of group key from their decedents as
this is a bottom up approach.
3.3.1 Group key computation without blind
factor
Figure (1): AVL Tree distributed Sensor Network
1. Function f can be applied to a block of data size
which can be handled by sensor nodes.
2. Function f produces a fixed length of partial key
3. F(x,y) should be easy to compute in sensor nodes.
4. For any given t, it is computationally infeasible to
find x, y such that f(x, y) =t.
A unique number is generated by a sensor node of a DSN is
used as Blind factor. Initially root node will broad cast a
message to root nodes to compute partial keys. Then leaf
nodes generate random number and use them as their partial
keys and broadcast them to their parent node. The parent node
gets partial keys from their dissidents and then adds their own
partial key and rebroadcast it. Finally root node will compute
group key and broadcast it.
The above three properties assures that the DSNs are able
to process the data and operations, as nodes in DSN will have
less storage, communication and processing power. The
function f should produce a fixed length partial key to
guarantee that at time of generating partial key the root node
knows how many partial keys are received without any loss. If
the partial key length is variable, then it is not possible to
know if the root node received all partial keys without any
loss. The last property it to make sure that partial key
computation is a one way function so that the child node
cannot act as parent node. This protects the DSN from any
insider attack.
To protect the DSNs from outside intruder, a MAC is
computed using the partial key and one time symmetric key. It
is attached to the partial keys so that the parent nodes can
verify the authenticity of the partial key.
MAC provides authentication and encryption gives
confidentiality and these two are used in the computation of
partial keys and then group key, it can be said that group key
provides security for the data transmission.
3.2 Group key management
Key management plays an important role enforcing access
control on the group key and consequently on the group
communication. It supports the establishment and
maintenance of key relation ship between valid groups
according to a security policy being enforced on the group.
Figure (2): Group key Computation
The leaf nodes N1, N2, N3, N4 compute and broadcast the
partial keys. Parent node N10 gets partial keys KN1 and KN2
from its child nodes N1 and N2 and computes its partial node
4
KN1N2N10 from KN1 and KN2 and its own contributing
factor. Like wise Group key will be calculated by the root
node
GrpKey=KN1N2N10N3N4N11N00
The root node broadcasts the above Group key to all its
dissidents
Sl No
No. of Nodes
1
2
3
4
5
3
7
15
31
63
Partial key Delivery
time in sec
0.06
0.2
0.2
0.4
0.9
The figure (3) below shows graph of the partial key delivery
time taken for Binary tree distributed wireless sensor network
and AVL tree DWSNs.
4. Simulation
Here we assume a binary tree up to level3. The parameters
considered for partial key computation of the leaf nodes are
random numbers width 16 bits. The prime number is 343 and
prime root is 3.
The partial key is computed by the parent node is
F(kl,kr)=akl ⊕ kr mod q
Where q is a prime number a is prime root of q
Figure (3) Partial key delivery time
kl and kr are partial keys of children
The computation of the Group Key is explained in section
3.3.1 and is computed as
The group key delivery time, the time required for the group
key reach all the dissidents from root node, is computed and
results are shown in Table (2)
C=kN1N2N20
Table (2)
The Group key delivery time taken for AVL tree DWSNs
5. Results
We have computed the partial key delivery time by number of
nodes for a binary distributed network.
Table shows the partial key delivery time for AVL distributed
tree and the number of nodes
Table 1
The partial key delivery time AVL distributed DWSN
Sl No
No. of Nodes
1
3
Group key Delivery
time in sec
0.06
2
3
4
5
7
15
31
63
0.098
0.15
0.265
0.37
The group key delivery time, the time required for the group
key reach all the dissidents from root node, is computed and
results are shown in Table (2)
5
The figure (4) below shows graph of the group key delivery
time taken for Binary tree distributed wireless sensor network
and AVL tree DWSNs.
[5]
Biswajit Panja and Sanjay Madria;” Energy-Efficient
Group Key Management Protocolsfor Hierarchical Sensor
Networks”, International Journal of Distributed Sensor
Networks, 3: 201–223, 2007 Copyright © Taylor &
Francis Group, LLC;ISSN: 1550-1329 print/1550-1477.
[6]
2010 International Conference on Computer Design and
Applications (ICCDA 2010).
Figure (4) Group key delivery time
6. Conclusion and future work
In this paper, we have computed Group Key for a AVL
Distributed Sensor Netwok, where all the nodes are contribute
their partial key in computing Group key. The future may be
to compute Group key for other trees such as Mordered trees
and comparision can be made with respect to broad casting
delivery time of group key by implementing routing protocols
like AODV , LEACH etc, in a Binary DSN, and study the
security features of binary DSNwhen a node I sadddeded or
deleted.
7. REFERENCES
[1]
[2]
[3]
[4]
Suresha; Dr Nalini; “Group Key Management In
Distributed Sensor Networks,” International Conference
On Data Engineering And Communication Systems
ICDECS – 2011, RNSIT, Bangalore, INDIA On Dec 3031, 2011.
Kun Zhang; Cuirong Wang;,”A New Group Key
Management Scheme With Simple Hash Based
Authentication For Wireless Sensor Networks,” Computer
Design And Applications (Iccda), 2010 International
Conference On , Vol.2, No., Pp.V2-626-V2-629, 25-27
June 2010.
Dr. Nalini N, “Distributed Sensor Networks: An
Overview”, National Conference, NCAIT, SJBIT,
Bangalore, 2010. 20.
Hairong Qia,, S. Sitharama Iyengarb, Krishnendu
Chakrabartyc Journal of the Franklin Institute 338 (2001)
655–668;www.elsevier.com/locate/jfranklin.
6