You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

4 August 2010

Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

and
Department of Computer Science and Information Engineering, Chaoyang University of Technology Taichung, Taiwan
*
Author to whom correspondence should be addressed.
This article belongs to the Section Chemical Sensors

Abstract

Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

1. Introduction

In recent years, there have been major advances in the development of wireless sensors and IC process technology. Due to these advances, wireless sensor networks (WSNs) have been replacing traditional network technologies []. These WSNs have a number of advantages over wired networks, such as ease of deployment, extended transmission range, and self-organization.

There are, however, a few inherent limitations to WSNs. These include low communication bandwidth, small storage capacity, limited computation resources, and limited device energy. In terms of energy, many researchers assume that all nodes in a sensor network are battery-driven [,]. Because of this, energy is a very scarce resource in sensor networks. Therefore, energy efficiency is an important design issue in WSNs.

Currently, WSNs are used in various applications. Figure 1 shows a schematic of applications for WSNs. Among their many applications, they can be used in the military, in agriculture, in transportation, in manufacturing, and in smart homes.

Figure 1. Wireless sensor network applications.

Generally speaking, a WSN consists of hundreds or thousands of densely populated sensor nodes that sense the environment they are in and collaboratively work to process and route sensor data. These sensor nodes relay data streams to base stations either periodically or based on events. A base station can be stationary or mobile. If it is mobile, it can move among the sensors and collect data. In a network densely populated with sensor nodes, the area detected by the sensors may overlap, and thus the data sensed by the sensors may be similar. Many wireless collisions occur in this type of network.

The general characteristics of a wireless sensor network include the following: ability for multiple deployments, low cost, small size, and adequate battery power supply. In addition, there are two types of structures for routing transmissions in a wireless sensor network:

  • Cluster: The cluster structure is the most representative of the routing protocols. The general concept behind the cluster structure is to group a large number of sensors into several clusters. In each cluster, a node is chosen as the cluster header. The cluster header collects information from the other sensor nodes within that cluster and transmits the information to the base station.

  • Chaining: The chaining structure differs from the cluster structure in that each detector node in a network is linked together to form a chain. In each round, a node in the chaining structure is chosen as the chain header. Nodes on both ends of the chain transmit data to adjacent nodes in the direction of the chain header, and each receiving node gathers the information. Finally, the chaining header transmits the information to the base station.

One of several basic network topologies may be used in WSN. The basic network topologies are shown in Figure 2. These include the star, tree, ring, fully connected, bus, and mesh topologies. Different topologies have different features or difficulties. Fully connected networks suffer from problems of NP-complexity. If nodes are added to this topology, the number of links increases exponentially. Mesh networks are regularly distributed networks that generally allow transmission only to a node’s nearest neighbors. In the star topology, all nodes are connected to a single hub node.

Figure 2. Network topology.

It is important to choose the right typology for a network. The type of topology used is important because it affects many network characteristics, such as robustness, energy consumption, and latency. The complexity of data routing and processing also depends on the topology.

Moreover, it is also very important to choose a proper encryption system to protect any transmitted messages. Due to the limited computation resource of a wireless sensor node, public key algorithms (such as Diffie-Hellman key management [] or the RSA mechanism []) are not feasible for solving security problems. We therefore propose a low cost dynamic session-key management for grid-based wireless sensor networks.

3. The Location-aware Dynamic Session-key Generation for Grid-based WSNs Scheme

In this paper, we propose a novel scheme for grid-based generation of a dynamic key to improve the security of previous methods. Our protocol is based on grid-based sensor networks. If a sensor node is selected from the sensors in a grid to announce the selection result and is used for routing, it is called a cluster node. Each base station can obtain information on an event from a grid header. If the base station is interested in the event, it queries the source via the grid header. In the interest region, the base station designates the range for data aggregation. The proposed scheme can defend against various attacks and reduce energy consumption. Figure 6 shows the grid structure.

Figure 6. Grid structure.

3.1. Eliminating the Broadcast Storm Effect

Broadcast storm effects may occur. To reduce the broadcast storm effect, each node will first broadcast its information to its neighboring nodes. The locations of the source and the interest region (see Section 3.3) will be used to limit the forwarding region. Thus, the broadcast storm problem can be reduced to a certain degree. However, if the forwarding zone is large, there will be a lot of redundancies, contentions, and collisions in the zone. In our protocol, the parameter range in a query packet is used to limit the forwarding zone.

The forwarding zone can be defined and limited. Let S and X be the source and destination of the cluster node. The forwarding zone Fan (θ, r), then, is an area in the shape of a fan from the grid S to the grid X with angle θ and radius r [], as shown in Figure 7.

Figure 7. The flooding region.

3.2. Grid Formation

The entire area of a wireless sensor network is partitioned into a 2D logical grid (a 4 × 4 grid, as illustrated in Figure 8). Each grid is a square of size d × d. Grids are identified (x, y) using the conventional x y-coordinate system. So that it is aware of its location, each node is equipped with a positioning device, such as a GPS receiver, from which it can read its current location. For any given location, there is a predefined mapping of the location to its grid coordinate. Each grid ID, which is given by [CX, CY], is assigned as follows: in the first row, from left to right, the grid IDs are [1, 1], [2, 1], [3, 1], and [4, 1]. In the second row, the grid IDs are [1, 2], [2, 2], [3, 2], and [4, 2], and so on. Based on the coordinate (x, y), each node computes its CX and CY as follows:

Figure 8. Grid index.
CX = x d ,   C Y = y d
where d is the grid size, and CX and CY are the largest integers not greater than x dand y d, respectively.

Using Equation (1), each node determines which grid it belongs to. Each node will also maintain a neighbor table. The neighbor table is generated using the periodic HELLO protocol [] at the beginning of a network life. The HELLO packet is small. In addition, the HELLO overhead from the periodic HELLO protocol is very small.

Let r be the transmission distance of a radio signal. We use the maximum value d = r / 2 2. The maximum value d of a cluster node is located at a grid and is capable of talking to any of the cluster nodes of its 8 neighboring grids. However, a smaller d also means more cluster nodes in the network, which in turn implies a higher overhead for delivering a packet, as well as more broadcast storm. Thus, there exists some tradeoff in choosing a moderate d value.

In each grid, one sensor node is selected to be the header of that grid. We call a node a “header” when it has more remaining energy than other nodes in that grid. Figure 9 shows a physical area partitioned into logical grids.

Figure 9. A physical area partitioned into logical grids

3.3. Selection of an Interest Region

When an interesting event happens in the selected region, a sensor node will be conscious of this event. After the event, a sensor node will broadcast a packet to find one-hop neighboring nodes. If a neighboring node is conscious of the event, it will forward this packet and store this message in an events table. We describe the event process below.

Step 1: When an event of interest happens in the interest region, a sensor node will be conscious of this event. The sensor node will broadcast a packet to its one-hop neighboring nodes.

Step 2: After receiving the packet, the neighboring nodes will be conscious of the event and will go to the next step; otherwise, the neighboring nodes will drop this packet.

Step 3: The neighboring nodes will forward the packet and store this message in their events table.

For example, in Figure 10, node E is conscious of an event occurring in its region. Node E will broadcast a packet to its one-hop neighboring nodes A, B, C, D, F, G, H and I. Because Nodes A, B, C, D, F, G, H and I are now conscious of the event in his region after receiving the packet, they will forward this packet and store this message in their events table. Nodes J, K, and L will drop this packet since they are not conscious of the event.

Figure 10. Selected interest region.

3.4. Cluster Node Election

To make certain that the cluster node stays alive in each grid, an efficient method for cluster node selection is necessary. Residual energy is used in the selection of the cluster node. In each grid, when the original cluster node residual energy is less than the assumed threshold, one node will be selected as the cluster node for that grid. To maintain the quality of routes, we let the cluster node of a grid be the node with the largest residual energy in that grid.

After a sensor node detects an interest region, the cluster node is selected. The steps for selecting a cluster node are follows:

Step 1: In the interest region, each sensor node sends a cluster node selection request packet < node_id, Grid_id, Residual_Energy, Timeout > to the other nodes, where Grid_id is an identification code for the grid and Residual_Energy is the residual energy of a node in a grid. If the time it takes for a cluster node to receive the selection request packet is greater than the Timeout value, then the packet is discarded.

Step 2: When a node receives the cluster node selection request packet, the node judges whether it has the largest residual energy. If it does, the node becomes a cluster node; otherwise, the request packet is discarded.

The cluster node will be selected periodically to keep the gateway from running out of energy.

The main feature of our scheme is as follows. We assume that a cluster node has the most residual energy. When a cluster node detects an interesting event, it will broadcast a packet to all the cluster nodes. Thus, all the cluster nodes will know whether an event has occurred. When a base station wants to know whether there has been an interesting event, it sends a request packet to ask the cluster node in its grid. When the cluster node receives the request packet, it sends a reply packet to the base station.

3.5. Notation

The notations used in our scheme and in this paper are given below, along with their meaning.

h( )

the one-way hash function, used for key generation.

ai, ai−1

two parameters used for generating a key which is pre-deployed in the ith sensor node, and ai+1 = h (ai).

bi, bi−1

two parameters used for generating a key which is pre-deployed in the ith cluster node.

N1, N2, N3

three nonces.

Ksi

the ith key of the sensor node.

Kci

the ith key of the cluster node.

Kmsg

the key used for encrypting or decrypting the updated-key message msgfinish.

Seed

the seed for updating the key which is pre-deployed in each of the sensor nodes.

IDsi

the identity of the ith sensor node.

IDci

the identity of the ith cluster node.

IDBi

the identity of the ith base station.

Csi

the encrypted information generated by the ith sensor node.

Cci

the encrypted information generated by the ith cluster node.

Cb

the encrypted information generated by the base station.

IDlist

the identity set list of the t sensor nodes received from the cluster nodes, such as IDlist = (IDs1, IDs2,…,IDst)

Klist

the key of the sensor nodes generated by the cluster node, such as Klist = (Ks1, Ks2,…,Kst)

Mi

the plaintext information is generated by the ith sensor node.

Mf

the latest information received by the base station.

E(M,K)

the symmetric encryption infrastructure makes use of key K (for example, AES-128 bits) to encrypt M.

D(M,K)

the symmetric decryption infrastructure makes use of key K (for example, AES-128 bits) to decrypt M.

A? = B

determine whether A equal to B.

3.6. Communication Protocol

In our proposed protocol, we use a dynamic key management mechanism. In this mechanism, two keys are preset in each sensor node. These two keys generate a new key for the next round, and will also be preset in the cluster node. The generation of the session key will be the same as the generation of the key in the sensor node. Using this key management mechanism, we can thus ensure the security of the data transmission. The transmission paths of the sensor network are shown in Figure 11.

Figure 11. Transmission paths for the sensor network.

We divide our protocol into the following steps, as shown in Figure 12.

Figure 12. The communication protocol.

Step 1: When the deployed sensor node i returns the collected data Mi, the sensor node will make use of the preset parameters ai and ai−1 to generate a key, Ksi, where

K si = h ( a i , a i 1 )
Furthermore, the two parameters Kmsg and the Seed preset in each of the nodes will use the hash function to generate a new message key, K′msg, where:
K msg = h ( K msg , Seed )

At that time, the sensor node generates N1 and makes use of Ksi to encrypt the collected data Mi, the preset K′msg, and N1 into packet Csi as follows:

C si = E ( ( M i , K msg , N 1 ) , K si )
The sensor node also computes the message authentication code MAC1 as follows:
MAC 1 = h ( ID si , K si )
The (Csi, MAC1, IDsi) is then transmitted to the cluster node.

Step 2: When the cluster node receives more than t packets, or when the period is longer than a specified time, the cluster node will record and transmit the identity, IDsi, of the sensor node. It will also arrange a list, IDlist

ID list = ( ID s 1 , ID s 2 , , ID st )

The cluster node will make use of the two preset parameters ai and ai−1 to generate a key, Kci, where

K ci = h ( a i , a i 1 )

At that time, the cluster node will generate N2 and make use of Kci to encrypt IDlist and N2

C ci = E ( ( ID list , N 2 ) , K ci )

After that, the cluster node computes the following message authentication code MAC2 and MAC3 as follows:

MAC 2 = h ( ID ci , K ci )
MAC 3 = h ( ID list , K ci )

The cluster node sends (Cci, MAC1, MAC2, MAC3, IDci) to the base station.

Step 3: After receiving the packet from the cluster node, the base station will seek the corresponding key Kci to verify the cluster node’s identity and decrypt Cci as follows:

h ( ID ci , K ci ) ? = MAC 2
( ID list , N 2 ) = D ( C ci , K ci )

Next, the base station will check the integrity of the IDlist using

h ( ID list , K ci ) ? = MAC 3

Based on the IDlist, the base station will search for the corresponding key Ksi and arrange them into the key list Klist, where Klist= (Ks1, Ks2,…, Kst). It will verify the sensor node’s identity using

h ( ID si , K si ) ? = MAC 1

If the above verifications fail, this packet will be discarded.

At that time, the base station will generate N3 and make use of Kci to encrypt(Klist, IDlist, N2, N3) The encrypted data Cb will be sent to the cluster node, where

C b = E ( ( K list , ID list , N 2 , N 3 ) , K ci )

Step 4: When the cluster node receives the response data Cb from the base station, it will make use of the key Kci, which is generated by itself, to decrypt Cb

( K list , ID list , N 2 , N 3 ) = D ( C b , K ci )

The cluster node will then check whether N2 is equal to the N2 generated in step 2.

The cluster node can only use the ith key Ksi of the sensor node of Klist to decrypt Csi; otherwise, this packet is discarded.

( M i , K msg , N 1 ) = D ( C si , K si )

After that, the cluster node will calculate the average value of each set of data and obtain Mf as follows:

M f = ( M 1 + M 2   + , , +   M t ) / t

This ensures that the data is accurate when it is transmitted to the backend. This cluster node will make use of Kci to encrypt Mf and N3 into C′ci,

C ci = E ( ( M f , N 3 ) , K ci )

The cluster node identity IDci along with C′ci are transmitted together to the base station. At that time, the cluster node will update the session key into K′ci for the next round.

K ci = h ( K ci , a i )

Furthermore, the cluster node will make use of the key K′msg, transmitted from the sensor node, to encrypt the transmitted update message msgfinish as follows:

C m = E ( ( msg finish , N 1 , N 3 ) , K msg )

The encrypted packet Cm will then be broadcasted to the sensor nodes to inform the sensor nodes that message transmission is completed. The cluster node will update the session key to K′ci, where

K ci = h ( K ci , b i , N 2 )

Step 5: When the base station receives the packet from the cluster node, it will confirm the identity IDcj of the cluster node first. It will also search for the key Kci to decrypt C′ci

( M f , N 3 ) = D ( C ci , K ci )

The base station will then check whether N3 is equal to the N3 generated in step 3.

Simultaneously, the base station will update the key of the cluster node and sensor node, which will be updated to K′si and K′ci, as follows:

K si = h ( K si , a i , N 3 )
K ci = h ( K ci , b i , N 2 )

Step 6: After receiving the message Cm, the sensor node will make use of K′msg for decryption, and will obtain the message msgfinish as follows:

( msg finish , N 1 , N 3 ) = D ( C m , K msg )

The sensor node will then check whether N1 is equal to the N1 generated in step 1.

The previously generated keys Ksi and ai are used to generate a new key K′si, where

K si = h ( K si , a i , N 3 )

K′si will be used to encrypt the transmitted data for the next transmission. When the sensor node transmits the data in the third round, the original message key K′msg will be updated to K″msg, where

K msg = h ( K msg , K msg )

The message key K″msg and the detected message M′i are encrypted by using K′si to C′si, where

C si = E ( ( M i , K msg ) , K si )

When the sensor node transmits data for the fourth time, the message key must be updated to K‴msg, where

K msg = h ( K msg , K msg )

The updated message key K‴msg and the detected message M″i are encrypted by using K″si to C″si,

C si = E ( ( M i , K msg ) , K si )

The session keys Ksi, K′si and K″si (K″si = h(K′si, ai+1, Nounce)) etc. are used for encrypting messages between the cluster node and the sensor node. In addition, the updated K″msg and K‴msg are the message keys which the cluster node uses to transmit complete messages msgfinsh to the sensor node during communication.

4. Security and Performance Analysis

4.1. Security Analysis

4.1.1. Security against Malicious Guessing Attacks

When a sensor network has been deployed for a certain period, the key database of the base station will be updated after a transaction so that an attacker cannot obtain the correct key to use in the next transmission. Each node includes the records of not more than three keys, which consist of two old keys and one newly generated key. When the new key is generated, the oldest key will be updated. This can improve the security of the network and reduce the memory load of the nodes.

4.1.2. Security against Replay Attacks

In each communication session, including communication from the sensor node to the cluster node or communication from the cluster node to the base station, “two-way” mutual authentication is used to prevent the replay attack. We use the nonces N1, N2 and N3 to check each communication message. Any communication can be determined to be legal or illegal by checking the correctness of the nonces. The related descriptions are given in steps 4.2, 5.2 and 6.2 in Figure 12. Our scheme is able to prevent replay attacks.

4.1.3. Security against Falsification Attacks

To ensure secure transmission, we use the keys Ksi and Kci to encrypt data transmitted between the cluster node and between the cluster node and the base station, respectively. When the sensor node returns the data to the cluster node, Csi = E((Mi, Kmsg, N1), Ksi) is used for encryption. When the communication between the cluster node and the base station is finished, Klist is obtained. The base station returns Ksi to the cluster node, and decryption begins. If the received key cannot decrypt the received packet, the received packet will be regarded as an illegal packet and will be abandoned. This practice ensures the integrity of the data transmitted, and guarantees that the data is sent from the sensor node administered by the cluster node.

4.1.4. Security against Man-in-the-Middle-Attacks and Guarantee of Data Privacy

When the sensor node communicates with the cluster node, the encryption mechanism is used to prevent man-in-the-middle attacks and ensure data privacy. The transmitted message is encrypted into Csi = E((Mi, Kmsg, N1), Ksi). The cluster node and the base station also use a similar method to prevent similar attacks and to ensure data privacy.

The attacker cannot obtain the protected data. Furthermore, the cluster node makes use of Kmsg to encrypt the complete message, and the message key will be updated for each transaction. Therefore, the attacker cannot imitate the cluster node to transmit a message. The man-in-the-middle-attack can thus be prevented.

4.1.5. Security against Node Capture Attacks

When security is needed to transmit data between the cluster node and the sensor node or between the cluster node and the base station node, we use the keys Ksi and Kci, respectively, for encryption. We make use of the one-way hash function to generate the key because the one-way hash function can prevent an attacker from inverting the key. (1) h(x) is relatively easy to compute for any given x, making both hardware and software implementations practical. (2) For any given value y, it is computationally infeasible to find x such that h(x) = y. This is sometimes referred to in the literature as the one-way property. (3) For any given block x, it is computationally infeasible to find z not equal to x with h(z) = h(x). This is sometimes referred to as weak collision resistance. A comparison of the security and characteristics of the grid-based schemes is given in Table 2.

Table 2. The security and characteristic comparison of the grid-based schemes.
  • Because TTDD, CODE and DARQ do not support dynamic session-key management, they may be susceptible to various attacks.

  • In CODE and TTDD, the base stations have to reissue a query to request data or use local flooding to request data when they move out of the original grid. This will increase energy consumption and the number of collisions. DARQ and our scheme will limit the interest region to prevent a flooding storm.

  • If the base station moves out of the original grid, it reconstructs a new routing path. But CODE does not solve the routing problem when there are obstacles or voids in a sensor field.

4.2. Mutual Authentication

The base station uses MAC2 (h (IDci, Kci) ? = MAC2) to authenticate the cluster node’s identity, MAC3 (h (IDlist, Kci) ? = MAC3) to authenticate the integrity of IDlist and MAC1 (h (IDsi, Ksi) ? = MAC1) to authenticate the sensor node’s identity. The reason is that the sensor node and cluster node are peer nodes. The cluster node does not store information related to the sensor node. The sensor node should therefore be authenticated by the base station. Otherwise, the cluster node can use N2 to authenticate the base station. The sensor node can use N1 to authenticate the cluster node. Our scheme performs mutual authentication. This makes it easier to detect an attacker.

4.3. Performance Analysis

Table 3 shows a comparison of the time complexity between our proposed protocol and Mizanur Rahman and El-Khatib’s scheme. Table 4 shows a comparison of the communication cost between our scheme and Mizanur Rahman and El-Khatib’s scheme. Table 5 shows a simulation which we developed based on NS2 (Network Simulation 2).

Table 3. Comparison of time complexity between our scheme and Mizanur Rahman and El-Khatib’s scheme.
Table 4. Comparison of communication cost between our scheme and Mizanur Rahman and El-Khatib’s scheme.
Table 5. Parameters used in the simulation environment.

The Mizanur Rahman and El-Khatib’s scheme is based on ECC public key encryption and the random number challenge response mechanism. By contrast our scheme is based on the symmetric cryptosystem and hash function mechanism. From Table 3 and Table 4, we can see that the operation time of our scheme is faster than that of Mizanur Rahman and El-Khatib’s scheme for a large number of sensors. But the H-node end of Mizanur Rahman and El-Khatib’s scheme is superior to ours for one transaction. However, the detailed analyses are presented in our scheme. Otherwise, the Mizanur Rahman and El-Khatib’s scheme should process a key agreement procedure in advance, our scheme only uses the dynamic parameters to complete the same function without specific communication during transaction. Our scheme is simpler. Two mechanisms are different; but the differences in communication cost are not significant.

In the following section, we compare the energy consumed in our proposed scheme to the energy consumed in other schemes. A comparison of the total energy consumption in other schemes for various different numbers of nodes is shown in Figure 13. As can be seen, the total energy consumed in the proposed scheme and in the DARQ, CODE and TTDD schemes increased when the number of grids increased. However, the total energy consumed in our scheme is less than the energy consumed in the CODE and TTDD schemes, but is more than the DARQ scheme. Since our scheme uses a grid-based mechanism to restrict the possibility of packet flooding, such a result meets our expectations. However, although our scheme is based on the DARQ scheme, more energy is consumed in encryption computation.

Figure 13. Comparison of energy consumption versus number of grids for different schemes.

5. Conclusions

We proposed an efficient management mechanism for WSNs that includes the following benefits:

  • The proposed mechanism can significantly conserves the memory of a sensor node.

  • Dynamic key management for each data transmission is used only once. This method reduces the probability of an attacker guessing a key correctly. The method thus improves security.

  • The total energy consumed in our scheme is less than the energy consumed in the other schemes except the DARQ scheme.

  • The proposed scheme uses a grid-based approach. In addition to using grids, we also limited the flooding region to decrease the overhead for routing discovery in order to reduce the probability of a flooding storm.

In future research, we will propose a solution to find a routing detour around void regions. Void regions exist in a network because some grids do not deploy sensors. The design of multiple interest regions will be taken into consideration to provide data aggregation for WSNs.

Acknowledgments

This work is partially supported by the National Science Council, Taiwan, under contract No. NSC 99-2628-E-324-026. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

References

  1. Intanagonwiwat, C; Govindan, R; Estrin, D; Heidemann, J; Silva, F. Directed diffusion for wireless sensor networking. IEEE Trans. Netw 2003, 11, 2–16. [Google Scholar]
  2. Estrin, D; Govindan, R; Heidemann, J; Kumar, S. Next century challenges: scalable coordination in sensor networks. Proceedings of the 5th IEEE/ACM Annual Conference on Mobile Computing and Networks, Seattle, WA, USA, August 1999; pp. 263–270.
  3. Rabaey, JM; Ammer, MJ; Silva, JL; Patel, D; Roundy, S. PicoRadio Supports ad hoc ultra low power wireless networking. IEEE Comput. Mag 2000, 33, 42–48. [Google Scholar]
  4. Hill, J; Szewczyk, R; Woo, A; Hollar, S; Culler, D; Pister, K. System Architecture directions for networked Sensors. Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 2000; pp. 93–104.
  5. Akyildiz, IF; Su, W; Sankarasubramanian, Y; Cayirci, E. A survey on sensor networks. IEEE Commun. Mag 2002, 40, 102–114. [Google Scholar]
  6. Zhao, YJ; Govindan, R; Estrin, D. Residual energy scan for monitoring sensor networks. Proceedings of the IEEE Wireless Communications and Networking Conference, Orlando, FL, USA, March, 2002; pp. 356–362.
  7. Diffie, W; Hellman, ME. New directions in cryptography. IEEE Trans Inform. Theory 1976, 22, 644–654. [Google Scholar]
  8. Rivest, R; Shamir, LA; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar]
  9. Blom, R. An optimal class of symmetric key generation systems. Proceedings of EUROCRYPT’84, Paris, France, 1985; pp. 335–338.
  10. Pietro, R; Mancini, L; Mei, A. Random key-assignment for secure wireless sensor networks. Proceedings of ACM workshop on Security of ad hoc and sensor networks, Fairfax, VA, USA, October 2003; pp. 62–71.
  11. Liu, D; Ning, P. Establishing pairwise keys in distributed sensor networks. Proceedings of ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, August 2005; pp. 41–77.
  12. Cheng, Y; Agrawal, DP. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Network 2007, 5(1), 35–48. [Google Scholar]
  13. Jolly, G; Kuscu, MC; Kokate, P; Younis, M. A low-energy key management protocol for wireless sensor networks. Proceedings of Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), Antalya, Turkey, 2003; 1, pp. 335–340.
  14. Intanagonwiwat, C; Govindan, R; Estrin, D. Directed diffusion: a scalable and robust communication paradigm for sensor networks. Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking, Boston, MA USA, August 2000; pp. 56–67.
  15. Xuan, HL; Seo, DH; Lee, S; Lee, YK. Minimum-energy data dissemination in coordination-based sensor networks. Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Hong Kong, China, Piscataway, NJ, USA, August 2005; pp. 381–386.
  16. Ye, F; Haiyun, L; Jerry, C; Songwu, L; Zhang, L. Sensor Networks: A two-tier data dissemination model for large-scale wireless sensor networks. Proceedings of the Eighth Annual ACM/IEEE International Conference on Mobile Computing and Networks, Atlanta, GA, USA, September 2002; pp. 148–159.
  17. Xuan, H; Lee, S. A coordination-based data dissemination protocol for wireless sensor networks. Proceedings of the Sensor Networks and Information Processing Conference, Brisbane, Australia, December 2004; pp. 13–18.
  18. Kim, H; Abdelzaher, T; Kwon, W. Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, November 2003; pp. 193–204.
  19. Want, R; Hopper, A; Falcao, V; Gibbons, J. The active badge location system. ACM Trans. Info. Syst 1992, 11, 91–102. [Google Scholar]
  20. Chen, TS; Chang, YS; Tsai, HW; Chu, CP. Data aggregation for range query in wireless sensor networks. Proceedings of the IEEE Wireless Communications and Networking Conference, Hong Kong, China, March 2007.
  21. Chen, W; Chen, L; Chen, Z; Tu, S. WITS: A wireless sensor network for intelligent transportation system. Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences, Hangzhou, China, April 2006; pp. 635–641.
  22. Liao, WH; Tseng, YC; Sheu, JP. GRID: A fully location-aware routing protocol for mobile ad hoc networks. Telecommun. Syst 2001, 18, 37–60. [Google Scholar]
  23. Mizanur Rahman, SK, MD; El-Khatib, K. Private key agreement and secure communication for heterogeneous sensor networks. J. Parallel. Distrib. Comput 2010, 70, 858–870. [Google Scholar]
  24. Koblitz, N. Elliptic curve cryptosystems. Math. Comput 1987, 48, 203–209. [Google Scholar]
  25. NIST Special Publication 800-57, Recommendation for key management—part 1: general (revised), 2007.
  26. Wellenhoff, BH; Lichtenegger, H; Collins, J. Global positions system: theory and pPractice, 4th ed; Springer Verlag: Heidelberg, Germany, 1997. [Google Scholar]
  27. Niculescu, D; Nath, B. Ad hoc positioning system (APS) using AoA. Proceedings of the IEEE 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA, April 2003; pp. 1734–1743.
  28. Kuhn, F; Wattenhofer, R; Zhang, Y; Zollinger, A. Geometric Ad-hoc Routing of theory and practice. Proceedings of the 22nd ACM Symposium on the Principles of Distributed Computing, Boston, MA, USA, July 2003; pp. 63–72.
  29. Bulusu, N; Heidemann, J; Estrin, D. GPS-less low cost outdoor localization for very small devices. IEEE Personal Commun. Mag 2000, 7, 28–34. [Google Scholar]
  30. Savvides, A; Han, CC; Srivastava, M. Dynamic fine-grained localization in ad-hoc networks of sensors. Proceedings of the 7th IEEE/ACM Annual Conference on Mobile Computing and Networks, Rome, Italy, July 2001; pp. 166–179.
  31. Savvides, A; Park, H; Srivastava, MB. The bits and flops of the n-hop multilateration primitive for node localization problems. Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA, September 2002; pp. 112–121.
  32. Nasipuri, A; Li, K. A directionality based location discovery scheme for wireless sensor networks. Proceedings of ACM Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA, September 2002; pp. 105–111.
  33. Savarese, C; Rabaey, J; Langendoen, K. Robust positioning algorithms for distributed ad-hoc wireless sensor networks. Proceedings of the USENIX Technical Annual Conference, Monterey, CA, USA, June 2002; pp. 317–327.
  34. Lee, RG; Chen, KC; Chiang, SS; Lai, CC; Liu, HS; Wei, MS. A backup routing with wireless sensor network for bridge monitoring system. Proceedings of the 4th Annual Communication Networks and Services Research Conference, Moncton, NB, Canada, May 2006; pp. 157–161.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.