CFP last date
20 May 2024
Reseach Article

A Survey on Security Techniques in Group Communication for Wireless Sensor Networks

by H S Annapurna, M. Siddappa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 7
Year of Publication: 2015
Authors: H S Annapurna, M. Siddappa
10.5120/19836-1689

H S Annapurna, M. Siddappa . A Survey on Security Techniques in Group Communication for Wireless Sensor Networks. International Journal of Computer Applications. 113, 7 ( March 2015), 6-12. DOI=10.5120/19836-1689

@article{ 10.5120/19836-1689,
author = { H S Annapurna, M. Siddappa },
title = { A Survey on Security Techniques in Group Communication for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 7 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number7/19836-1689/ },
doi = { 10.5120/19836-1689 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:18.610418+05:30
%A H S Annapurna
%A M. Siddappa
%T A Survey on Security Techniques in Group Communication for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 7
%P 6-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless network is a type of network where various physical devices (e. g. computer, laptops, PDAs etc) are interconnected with each other using network infrastructure. Owing to wireless medium of data communication, the security risk is potentially high for unauthorized access and intrusion of various malicious programs. The security protocols of wireless network are governed by family of IEEE 802. 11 standards. Wireless Network is studied in research with respect to wireless LAN (Local Area Network), wireless mesh network, wireless sensor network, mobile adhoc network, etc. In recent times, wireless sensor network was on constant focus among the research community owing to its potential advantage of data collection in remote areas as well as security problems associated with it. Wireless Sensor Network (WSN) consists of various sensor motes that form a cluster and perform data aggregation. Usually, the aggregated data is forwarded from the sensor nodes to the base station, which then reaches to user for analysis. The security problems is a matter of concern even for wireless sensor network that aims for either compromising the routing protocols or invoke illegitimate access to resources by bypassing the security protocols. In a wireless sensor network, the commununication takes place by group based, where sensor nodes are deployed in groups and each group performs communication using keys. Therefore this paper reviews some of the potential key-management techniques in past for maintaining group based communication and extracts the research gap.

References
  1. Tilak, Sameer, Nael B. Abu-Ghazaleh, and Heinzelman, W. 2002. Taxonomy of wireless micro-sensor network models. ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 6, No. 2, pp. 28-36.
  2. Akyildiz, Ian F. , Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. 2002. Wireless sensor networks: a survey. Computer networks, Vol. 38, No. 4, pp. 393-422
  3. Diffie, Whitfield, and Hellman, Martin E. 1976. New directions in cryptography. Information Theory, IEEE Transactions, Vol. 22, No. 6, pp. 644-654.
  4. Rivest, Ronald L. , Adi Shamir, and Len Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol. 21, No. 2, pp. 120-126
  5. Allen, Christopher, and Tim Dierks. 1999. The TLS protocol version 1. 0.
  6. Kohl, John T. , B. Clifford Neuman, and Y. Theodore. 1994. The evolution of the Kerberos authentication service.
  7. Kausar. F, Hussain. S, Park. J. H, and Masood. A. 2007. Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks. Springer-Verlag Berlin Heidelberg, pp. 737–748
  8. Gaddour, O. , Koubaa, A. , Abid, M. 2009. SeGCom: A Secure Group Communication Mechanism in Cluster-Tree Wireless Sensor Networks. IEEE First International Conference on Communications and Networking, pp. 1-7
  9. Garcia, M. , Lloret, J. , Sendra, S. and Lacuesta, R. 2010. Secure Communications in Group-based Wireless Sensor Networks. International Journal of Communication Networks and Information Security, Vol. 2, No. 1
  10. Tian, B. , Han, S. , Hub, J. , Dillon, T. 2011. A mutual-healing key distribution scheme in wireless sensor networks. Journal of Network and Computer Applications, Elsevier, Vol. 34, pp. 80–88
  11. Cheikhrouhoua, O. , Koubaab, A. , Dinif, G. , Alzaidd, H. , Abid, M. 2011. LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks. The 2nd International Conference on Ambient Systems, Networks and Technologies (ANT), ScienceDirect, Elsevier, Vol. 5, pp. 198–207
  12. Cheikhrouhou, O. , Koubaa, A. , Dini, G. , Abid, M. 2011. RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks. Journal Personal and Ubiquitous Computing, ACM Digital Library, Vol. 15, Iss. 8, pp. 783-797
  13. Nicanfar, H. , and Leung, V. C. M. 2012. Password Authenticated Cluster-Based Group-Key Agreement for Smart Grid Communication. Security and Communication Networks Security Comm. Networks, pp. 1–11
  14. Bechkit, W. , Challal, Y. , Bouabdallah, A. , and Tarokh, V. 2013. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks. IEEE Transactions on Wireless Communications, vol. 12, Iss. 2, pp. 948-959
  15. Bag, S. , and Roy, B. 2013. A new key predistribution scheme for general and grid-group deployment of wireless sensor networks. EURASIP Journal on Wireless Communications and Networking
  16. Sahoo, S. K. , and Sahoo, M. N. 2014. An Elliptic Curve based Hierarchical Cluster Key Management in Wireless Sensor Network. Springer
  17. Eltoweissy, Mohamed, M. Hossain Heydari, Linda Morales, and I. Hal Sudborough. 2006. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Network. IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 17,pp. 865-882
  18. Madden, Samuel, Robert Szewczyk, Michael J. Franklin, and David Culler. 2002. Supporting aggregate queries over ad-hoc wireless sensor networks. In Mobile Computing Systems and Applications, Proceedings Fourth IEEE Workshop on, pp. 49-
  19. Raazi, SMK-u-R. , Sungyoung Lee, Young-Koo Lee, and Heejo Lee. 2007. MUQAMI: A Locally Distributed key Management Scheme for Clustered Sensor Networks. IFIP International Federation for Information Processing, Vol. 238, Springer, pp. 333-348
  20. Lamport, Leslie. 1981. Password authentication with insecure communication. Communications of the ACM, Vol. 24, No. 11, pp. 770-772
  21. Dini, Gianluca, and Ida Maria Savino. 2006. An efficient key revocation protocol for wireless sensor networks. In Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 450-452
  22. Zhu, Sencun, Sanjeev Setia, and Sushil Jajodia. 2006. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), Vol. 2, No. 4, pp. 500-528
  23. Cherukuri, Sriram, Krishna K. Venkatasubramanian, and Sandeep KS Gupta. 2003. BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In Parallel Processing Workshops, 2003. Proceedings. International Conference, pp. 432-439
  24. Falck, Thomas, Heribert Baldus, Javier Espina, and Karin Klabunde. 2007. Plug'n play simplicity for wireless medical body sensors. Mobile Networks and Applications, Vol. 12, No. 2-3, pp. 143-153.
  25. Raazi, SMK-u-R. , Sungyoung Lee, Young-Koo Lee, and Heejo Lee. 2009. BARI: A distributed key management approach for wireless body area networks. In Computational Intelligence and Security. CIS'09. International Conference, Vol. 2, pp. 324-329
Index Terms

Computer Science
Information Sciences

Keywords

Application Dependent Sensor Network Key Management Security WSN