Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Security Model for Hierarchical Clustered Wireless Sensor Networks
Kalpana Sharma, S. K. Ghosh, M.K. Ghose
Pages - 85 - 97     |    Revised - 31-03-2011     |    Published - 04-04-2011
Volume - 5   Issue - 1    |    Publication Date - March / April 2011  Table of Contents
WSN, Security, Hierarchical Clustering, Cluster Heads, Routing, Key Management
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
CITED BY (7)  
1 Tomar, G. S., Kevre, P., & Shrivastava, L. Energy model based Performance Analysis of cluster based wireless sensor network.
2 Vijayalakshmi, V., Sharmila, R., & Shalini, R. (2015, March). Hierarchical key management scheme using Hyper Elliptic Curve Cryptography in Wireless Sensor Networks. In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on (pp. 1-5). IEEE.
3 Awati, J. S. (2014). Application of wireless sensor networks for agricultural parameter control.
4 Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security (IJCNIS), 5(3).
5 Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012, November). Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 585-590). IEEE.
6 Gawdan, I. S., Chow, C. O., Zia, T., & Sarhan, Q. I. (2011, September). A novel secure key management module for hierarchical clustering wireless sensor networks. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on (pp. 312-316). IEEE.
7 Wuzong Tao, Chen Haiyan, & Song Feng. (2011). Wireless sensor networks tufted hierarchical key management scheme design. Ship Electronic Engineering, 31 (11), 108-111.
1 Google Scholar
2 Academic Journals Database
3 CiteSeerX
4 refSeek
6 Libsearch
7 Scribd
8 SlideShare
9 PdfSR
1 David Boyle and Thomas Newe,” Securing Wireless Sensor Networks: security Architectures” (2008), Journal of Networks, VOL. 3, NO. 1,pp 65-77.
2 Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D.Tygar. Spins: Security protocols for sensor networks. Wireless Networks, 8:521 – 534, 2002.
3 Zhu, S., Setia, S., Jajodia, S. (2003) ‘LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks’, CCS ’03, Washington D.C., USA, 27 – 31 October 2003, New York, USA: ACM Press, 62-72.
4 Zhu, S., Setia, S., Jajodia, S. (2006) ‘LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks’, ACM Transactions on Sensor Networks TOSN,2(4), 500-528.
5 A.S.Poornima and B.B.Amberker,” Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks”, International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009.
6 T.A Zia and A.Y. Zomaya, ‘A Secure Triple-Key Management Scheme for wireless sensor networks’, in the proceedings of INFOCOM 2006,25th IEEE International Conference on Computer Communications, Barcelona, pp1-2 ,23-29 April 2006 .
7 W. Du, J. Deng, Y.S. Han, P.K. Varshney, A key predistribution scheme for sensor networks using deployment knowledge, IEEE Transactions on Dependable and Secure Computing, Vol. 3, issue 1, Jan-March 2006 pp.62-77.
8 Tanveer Zia and Albert Zomaya,” A Security Framework for Wireless Sensor Networks “, SAS 2006 – IEEE Sensors Applications Symposium Houston, Texas USA, 7-9 February 2006.
9 Navin Gautam, Won-Il Lee, Jae-Young Pyun, "Track-Sector Clustering for Energy Efficient Routing in Wireless Sensor Networks," cit, vol. 2, pp.116-121, 2009 Ninth IEEE International Conference on Computer and Information Technology, 2009.
10 Du X, Xiao Y, M Guizani, Chen H.H, (2007) “Effective key management for sensor networks, an effective key management scheme for heterogeneous sensor networks”, Ad Hoc Networks, Volume 5, Issue 1, 1 January 2007, Pages 24-34.
11 Kalpana Sharma, S.K. Ghosh, and M.K. Ghose ‘Establishing an Integrated Secure Wireless Sensor Network System: A New Approach’, International Journal of Next Generation Networks ( IJNGN), Sept.2010
12 D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks”, ACM CCS 2003.
13 Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, M.K Ghose ,‘Power-efficient Routing & Increased Yield Approach for WSNs ‘,International Journal on Computer Science and Engineering (IJCSE),Vol. 02, No. 03, 2010, pp 586-592.
14 C. karlof, N. Shastry and D. Wagner, TinySec: A link layer security architecture for wireless sensor networks, SenSys’04, November 3-5, 2004, Baltimore, Maryland, USA
15 Heinzelman, A. Chandrakasan and A. Balakrishnan,’ Energy-Efficient Communication Protocol for Wireless Microsensor Networks’, proceedings of the 33rd Hawaii International Conference on System Science, Jan 2000.
16 Bhaskaran Raman et. al, ‘Censor Networks: A Critique of “Sensor Networks” from a Systems Perspective’, ACM SIGCOMM Computer Communication Review, Volume 38, Number 3, July 2008.
17 Al-Sakib Khan Pathan et al. “Security in Wireless Sensor Networks: issues and Challenges”, ICACT2006 in Feb. 20-22, 2006, ISBN 89-5519-129-4 pp(1043-1048).
18 Sami S., Wakeel and Eng. Saad A. AL-Swailem,”PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks”, WCNC 2007 Proceedings, pp (4159-4163).
19 Ayman Khalil, Matthieu Crussière and Jean-François Hélard,’Cross Layer Resource Allocation Scheme under Heterogeneous constraints for Next Generation High Rate WPAN (2010),International Journal of Computer Networks and Communications( IJCNC) vol 2, No. 3.
20 A.R. Masoum, A.H. Jahangir,Z. Taghikhani, and R. Azarderakhsh, (2008) ”A new multi level clustering model to increase lifetime in wireless sensor networks”, Proceedings of the Second International Conference on Sensor Technologies and Applications, pp 185-190.
21 Germano Guimaraes, Eduardo Souto, Djamel Sadok, Judith Kelner (2005), “Evaluation of Security Mechanisms in Wireless Sensor Networks”, proceedings of the 2005 Systems Communication ( ICW ’05) ,P 428-438, 0-7695-2422-2/05.
22 Kyung Jun Choi and Jong-In Song (2006), “ Investigation of Feasible Cryptographic Algorithms for Wireless Sensor Network”, in the proceedings of International Conference of Advanced Communication Techniques ( ICACT 2006), 89-5519-129-4.
23 Soroush Hamed, Salajegheh Mastooreh and Dimitriou Tassos (2007) “Providing Transparent Security Services to Sensor Networks” Proceedings of IEEE International Conference on Communication (ICC’07).24-28 June 2007.
24 Zhou, Y., and Fang, Y. (2007), ‘A two-layer key establishment scheme for WSN’. IEEE trans. Mobile Computing, Volume 6, No. 9, pp: 1009-1020.
25 Zhou, Y., Fang, Y., and Zhang, Y. (2008), ‘A survey of Securing Wireless Sensor network’. IEEE communication surveys, Volume 10, No. 3, pp: 6-28.
26 Chan, H.,and Perrig, A., (2005), ‘PIKE: Peer Intermediaries for Key Establishment in Sensor Networks’. In Proceedings of IEEE Infocom, Miami, Florida, pp: 524-535.
27 Ibriq, J., and Mahgoub, I. (2007), ‘A Hierarchical Key Establishment Scheme for Wireless Sensor Networks’. 21st International Conference on Advanced Networking and Applications, pp: 210-219.
28 Undercoffer, J., Ayancha, S., Joshi, A., Pinkston, J. (2004), ‘Security for Wireless Sensor Networks’, Wireless Sensor Networks, Kluwer Academic Publishers Norwell, USA, pp: 253- 275.
Mr. Kalpana Sharma
Sikkim Manipal Institute of Technology - India
Dr. S. K. Ghosh
Dr. M.K. Ghose
Sikkim Manipal Institute of Technology - India