Cluster Based Mobile Key Management Scheme to Improve ... · Cluster Based Mobile Key Management...

5
Cluster Based Mobile Key Management Scheme to Improve Scalability and Mobility in Wireless Sensor Networks M.Shainika 1, Mrs.C.Hema 2 1 Post graduate student, 2 Assistant professor B.S.AbdurRahman University 1 [email protected] 2 [email protected] Abstract- The demands of Wireless Sensor Networks(WSN) increase the challenges in terms of scalability and mobility. The scalability is important to improve the energy efficiency and network lifetime, while mobility helps to improve the reachability of network. In this paper a new Cluster-based Mobile Key Management Scheme (CMKMS) is proposed. The CMKMS Scheme algorithm is used for the management and maintenance of keys under cluster-based mobile WSN network. In this scheme a cluster is formed and Cluster Head (CH) is selected and it is acting as a key manager. The work makes an assumption that sensor nodes and CH can move from one position to another.CH manages and maintains the private keys of sensor nodes.This algorithm also shows less computational overheads and energy consumption. This paper accomplishes the scalability of WSN using mobility-supported key management algorithms. Key words: Wireless sensor network (WSN), Cluster-based Mobile Key Management scheme (CMKMS), Cluster Head (CH), scalability, mobility. I.INTRODUCTION The wireless sensor networks (WSNs) are distributed autonomous sensors to identify physical conditions like temperature, motion etc and to cooperatively pass their data through the network to a main location.The Wireless Sensor Networks (WSNs) are used in different real-time and mission- critical applications. The more modern networks are bidirectional, and also enabling control of sensor nodes activities. The development of wireless sensor networks was motivated by different military applications such as battlefield surveillance; today such networks are used in various industrial and consumer applications, such as process of industries, monitoring and control, machine health monitoring etc. The WSN is built of nodes which from a few to several hundreds or thousands, where each node is connected to one or different sensors. That sensor network node has several parts: a radio transceiver with an internal antenna or connection to an external antennas, a microcontroller, an electronic circuits for interfacing with the sensors and an energy source, especially a battery or a form of energy harvesting. A sensor node might vary in their size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is ranging from a few to hundreds of dollars, depending on the complexity of the sensor nodes. Size and cost constraints on wireless sensor nodes result in corresponding constraints on multiple resources such as memory, energy, computational speed and communications bandwidth. The topology of the WSNs can differ from a simple star networks to an advanced multi-hop wireless mesh networks. The propagation technique between the hops of the network can be routing or flooding. Wireless Sensor Networks are an active research area in computer science and telecommunication with numerous workshops and conferences arranged each year. II.RELATED WORK The key management and maintenance techniques [1] are defined using cluster based mobile key management scheme with static Cluster Head (CH).The available key management algorithm is efficient in terms of security, but it is not scalable enough to the changing conditions of network and do not work efficiently under node mobility.This method shows less computational overheads, energy consumption and delay as compared with state-of-art

Transcript of Cluster Based Mobile Key Management Scheme to Improve ... · Cluster Based Mobile Key Management...

Cluster Based Mobile Key Management

Scheme to Improve Scalability and Mobility

in Wireless Sensor Networks M.Shainika

1, Mrs.C.Hema

2

1Post graduate student,

2Assistant professor

B.S.AbdurRahman University [email protected]

[email protected]

Abstract- The demands of Wireless Sensor

Networks(WSN) increase the challenges in terms

of scalability and mobility. The scalability is

important to improve the energy efficiency and

network lifetime, while mobility helps to improve

the reachability of network. In this paper a new

Cluster-based Mobile Key Management Scheme

(CMKMS) is proposed. The CMKMS Scheme

algorithm is used for the management and

maintenance of keys under cluster-based mobile

WSN network. In this scheme a cluster is formed

and Cluster Head (CH) is selected and it is acting

as a key manager. The work makes an assumption

that sensor nodes and CH can move from one

position to another.CH manages and maintains

the private keys of sensor nodes.This algorithm

also shows less computational overheads and

energy consumption. This paper accomplishes the

scalability of WSN using mobility-supported key

management algorithms.

Key words: Wireless sensor network (WSN),

Cluster-based Mobile Key Management scheme

(CMKMS), Cluster Head (CH), scalability,

mobility.

I.INTRODUCTION

The wireless sensor networks (WSNs) are

distributed autonomous sensors to identify physical

conditions like temperature, motion etc and to

cooperatively pass their data through the network to a

main location.The Wireless Sensor Networks

(WSNs) are used in different real-time and mission-

critical applications. The more modern networks are

bidirectional, and also enabling control of sensor

nodes activities. The development of wireless sensor

networks was motivated by different military

applications such as battlefield surveillance; today

such networks are used in various industrial and

consumer applications, such as process of industries,

monitoring and control, machine health monitoring

etc.

The WSN is built of nodes which from a

few to several hundreds or thousands, where each

node is connected to one or different sensors. That

sensor network node has several parts:

a radio transceiver with an internal antenna or

connection to an external antennas, a microcontroller,

an electronic circuits for interfacing with the sensors

and an energy source, especially a battery or a form

of energy harvesting. A sensor node might vary in

their size from that of a shoebox down to the size of a

grain of dust, although functioning "motes" of

genuine microscopic dimensions have yet to be

created.

The cost of sensor nodes is ranging from a

few to hundreds of dollars, depending on the

complexity of the sensor nodes. Size and cost

constraints on wireless sensor nodes result in

corresponding constraints on multiple resources such

as memory, energy, computational speed and

communications bandwidth. The topology of the

WSNs can differ from a simple star networks to an

advanced multi-hop wireless mesh networks. The

propagation technique between the hops of the

network can be routing or flooding. Wireless Sensor

Networks are an active research area in computer

science and telecommunication with numerous

workshops and conferences arranged each year.

II.RELATED WORK

The key management and maintenance

techniques [1] are defined using cluster based mobile

key management scheme with static Cluster Head

(CH).The available key management algorithm is

efficient in terms of security, but it is not scalable

enough to the changing conditions of network and do

not work efficiently under node mobility.This method

shows less computational overheads, energy

consumption and delay as compared with state-of-art

K DURAISAMY
Text Box
National Conference on Research Advances in Communication, Computation, Electrical Science and Structures (NCRACCESS-2015)
K DURAISAMY
Text Box
K DURAISAMY
Text Box
ISSN: 2348 - 8387 www.internationaljournalssrg.org Page 22

solution. The mobility management is difficult when

using static cluster head.

The method [2] a new energy efficient

hierarchical clustering algorithm shows the

performance of clustering algorithm based on soft

threshold and member bounds for Wireless sensor

networks using different clustering protocols. This

algorithm has better performance in CH election and

energy efficient. The hierarchical clustering

algorithm also improves the lifetime and the energy

consumption significantly in the wireless sensor

networks. But this scheme is not scalable enough

when the changing condition of network.

The energy efficiency [3] is essential

requirement for wireless sensor networks. The energy

efficient deterministic key management (EDDK)

scheme is focuses on establishment and maintenance

of pairwise keysand local cluster keys. The EDDK

scheme is using the elliptic curve digital

signaturealgorithm for both new and mobile sensor

nodes can join or rejoin a sensor network securely.In

this scheme is the energy consumption and overhead

is very low. But this scheme is not scalable for large

networks.

The existing key management algorithms

such as network wide key, full pair-wise,

probabilistic, matrix-based and polynomial-based

schemes are efficient only in terms of

securityandthey are not scalable enough when the

changing conditions of network and not efficient

under node mobility.

III.METHODOLOGY USED

A.Cluster-based Mobile Key Management Scheme

The Cluster-based Mobile Key Management

Scheme (CMKMS) is used to improve the salability

and mobility and efficiency of sensor nodes (SN).

The network is partitioned into clusters. The node

with maximum trust ability and efficiency is selected

as Cluster Head (CH). The CH ia acting as a key

manager it aggregates information from all other

nodes in the cluster. The work makes an assumption

that sensor nodes and CH can move from one

position to another.

The communication in between the SN and

SN is intra-cluster communication, which is done

using SN-to-SN link. The transmission in between

the CH and CH or CH and Base Station (BS) is inter-

cluster communication, which is done via CH-to-CH

link or CH to BS link. The key management

algorithm here considers the CH as KM. The work

makes an assumption that nodes can move from one

position to another, but CH and BS are fixed at one

position.

Fig: cluster formation

This CMKMS algorithm considers the

following two scenarios:

(i)Scenario 1, Here,the Cluster Head is static and

aggregates information from all other sensor nodes in

the cluster. The other sensor nodes are mobile nodes

and they may move from one place to another place

i.e. may move from one cluster to otherCluster. Here

CH is acting as a Key Manger (KM) that manages the

keys of all nodes within the cluster. Whenever a node

is changing position and moving from one CH to

other, i.e. from its home CH (HCH) to foreign CH

(FCH), the key management scenario is considered.

(ii) Scenario 2, Here, CH and nodes both are mobile,

i.e. Key Manager and nodes both are mobile. The CH

should transfer the key management responsibility to

other nodein cluster, i.e. to make new KM or CH in

network. Whenever the CH or KM is coming near the

boundary of cluster, it transfers the key management

responsibilities to other CH by running CH selection

algorithm.This CMKMS approach establishes two

private keys, home key and foreign key. The home

key is used for the communication within own cluster

and the foreign key is used when node moves from

one cluster to another.

The main notations used to explain the

algorithm are follows:

Ni: node ID;

Ci: cluster ID;

Kh: home key;

Kf: foreign key;

Nc: average number of nodes per cluster;

nc: number of cluster in the network;

l: average number of cluster neighbour;

MACk: hash function.

K DURAISAMY
Text Box
National Conference on Research Advances in Communication, Computation, Electrical Science and Structures (NCRACCESS-2015)
K DURAISAMY
Text Box
ISSN: 2348 - 8387 www.internationaljournalssrg.org Page 23

IV. PROPOSED WORK

In the existing algorithm when a cluster

head moves from one cluster to another cluster, the

CH send the key management responsibilities to

another node within the own cluster. The new CH is

selected randomly using CH selection algorithm i.e.

the new CH is selected based on its efficiency and

trust ability. The proposed work here is the moving

CH selects the new CH for the cluster. By this

method the mobility management is improved. It is

also increases the network lifetime and efficiency of

the wireless sensor network.

A.Working Mechanism

The working mechanism is divided into two

parts,which are given as follows:

(i) Set-up phase:In this phase a cluster is

establishedin the network and cluster keys are set up

in the network.

The set-up phase is divided into two parts,

organizing network into clustersand setting up a

cluster keys for each cluster in the network. It is

responsible for establishing a securelink between

clusters to make the whole network connect securely.

Here, a unique ID is assigned to each sensor nodes

that identifies them distinctly in a network.

Thealgorithm considers that each node maintains the

two key, key Kh, i.e. home key, andKf, i.e. foreign

key. Kh is used to communicate within the own

cluster and CH, and Kf isused for the communication

with foreign CH or nodes during node mobility.

Thesekeys will be used for secure information

exchange in between the nodes.

The set-up phase is defined as the following

algorithm steps:

Step 1: Start the program

Step 2: The sensor nodes waits for random amount of

time.

Step 3: The nodes broadcast Hello message

Step 4: nodes receive Hello message

Step 5: If node decide the role, it rejects all the

messages to become CH and member at same time

and sends the ACK message.

Step 6: join the cluster of the node that send the

message.

Step 7: Set Kh and Kf as cluster key and construct

polynomial h(x).

(ii) Key maintenance:The key maintenance phase is

responsible for maintaining andmanaging the home

keys and foreign keys during node mobility.

This phase maintains the keys in following

different situations:

Case 1: When new node joins the cluster

Step 1: The new node sends a beacon message to

Cluster.

Step 2: The cluster nodes picking the beacon message

and forward it to the Cluster Head.

Step 3: The cluster head merges the new node with

the Cluster.

Step 4: New node runs the Cluster setup phase and

gets the (Home key and Foreign key).

Case 2: When any node moves from one cluster to

the other cluster

Step 1: The Leaving node sends a beacon message to

the Cluster head of Home cluster.

Step 2: The CH informs this to its members and

Neighbour CH.

Step 3: The Neighbour CH understands this and

communicates with the incoming node with foreign

key.

Step 4: Finally, new node runs the Cluster setup

phase and gets the (Home key and foreign key).

V.SIMULATION RESULTS

The implementation is performed by using

discrete event simulator Network Simulator-2 (NS-

2). The NS-2 is an event driven packet level network

simulator Version 2 included a scripting language

called Object oriented Tcl (OTcl).

A.Results without WSN mobility

In case of key management algorithms, large

numbers of overheads are occurring during the

network initialization phase. It includes the

encryption and authentication of the local

broadcastmessages, the verification and decryption of

the received message from neighbor cluster

andcalculation of functions. The overheads are

majorly measured in terms of computationoverheads,

which show number of packets transmitted for

initialization, average-energyand delay incurred for

it.

The CMKMS algorithm is compared with

Energy Efficient Hierarchical clustering (EEHC)

algorithm. By compared with EECH the CMKMS

algorithm is less computational overhead, average

energy consumption and delay.

K DURAISAMY
Text Box
National Conference on Research Advances in Communication, Computation, Electrical Science and Structures (NCRACCESS-2015)
K DURAISAMY
Text Box
ISSN: 2348 - 8387 www.internationaljournalssrg.org Page 24

Fig: computational overheads of EEHC and

CMKMS

b. Results with random WSN node mobility

The simulation considers that the nodes

innetwork are mobile which moves from one position

to another expect the CH. The resultsof

computational overheads, average energy

consumption and average delay show

thatperformance overheads in case of mobility are

more than the results without mobility.The main

reason of increasing performance overhead is when

node goes mobile, itchanges its neighbourhood. The

change in neighbourhood directly effects on

calculationof pair-wise and individual keys.

Fig: average energy consumption of EEHC and

CMKMS

C. Results with mobile CH

The performance overhead is increases when the

node mobility. The main reasons are,

It changes its neighbourhood and the change

in neighbourhood effect oncalculation of

keys, pairwise- and individual keys; and

It also reflects in re-election of CHs.

Fig:average delay of EEHC and CMKMS

VI.CONCLUSION

The different key management algorithms

are proposedto define a new key management

approach to satisfy the increased scalability and

mobility requirements of WSN applications. The

proposed CMKMS algorithm satisfies the scalability

and mobility requirement by reducing the

computational complexity of the algorithm. The

CMKMS shows less computational overheads,

average energy consumption and improves network

lifetime and efficiency. The CMKMS algorithm

shows 20-23 percent improvements over state-of-art

algorithm.

REFERENCES

[1] SachinDilip Babar, NeeliRashmi Prasad and

Ramjee Prasad., “Cluster-based mobile key

management scheme for wireless sensor network”,

Emerald Group Publishing Limited 1742-7371,

International Journal of Pervasive Computing and

Communications; Vol. 10 No. 2. 2014.

[2] Golsorkhtabaramiri M, Hosseinzadeh M,

Golsorkhtabaramiri A, Heikalabad SR. “HCABS:

The hierarchical clustering algorithm based on soft

threshold and cluster member bounds for wireless

sensor networks”. IEICE Electron Express; 9(7):685–

690. 2012.

[3] Zhang, X., Jingsha, H. and Wei, Q.,”EDDK:

Energy-Efficient distributed deterministic key

management for wireless sensor

networks”.EURASIP Journal on Wireless

Communications and Networking, vol.no.1.2012.

[4] Zhang, J. and Varadharajan, V., “Wireless sensor

network key management survey and taxonomy”,

Journal of Network and Computer Applications Vol.

33 No. 2, pp. 63-75, 2011.

[5] Canh, N.T., Lee, Y.K. and Lee, S. (2008),

“HGKM: A group-based key management scheme

for sensor networks using deployment knowledge”,

in Communication Networks and Services Research,

0

1

2

3

4

5

10 20 30 40 50 60 70 80 90 100

CO

MP

UTA

TIO

NA

L O

VER

HEA

D

NO.OF NODES

CMKMS EEHC

0

2

4

6

10 20 30 40 50 60 70 80 90 100AV

ERA

GE

EN

ERG

Y C

ON

SUM

PTI

ON

NO.OF NODES

CMKMS EEHC

0

1

2

3

4

5

6

10 20 30 40 50 60 70 80 90 100

AV

ERA

GE

DEL

AY

NO.OF NODES

CMKMS EEHC

K DURAISAMY
Text Box
National Conference on Research Advances in Communication, Computation, Electrical Science and Structures (NCRACCESS-2015)
K DURAISAMY
Text Box
ISSN: 2348 - 8387 www.internationaljournalssrg.org Page 25

Proceedings of the Sixth Annual conference in Los

Alamitos, CA, pp. 544-551. 2011.

[6]Donggang Liu, PengNing, Wenliang Du., “Group-

Based Key Predistribution for Wireless Sensor

Networks”, ACM Transactions on Sensor Networks,

Vol. 4, March 2008.

[7] WalidBechkit, YacineChallal,

AbdelmadjidBouabdallah, and VahidTarokh., “A

Highly Scalable Key Pre-Distribution Scheme for

Wireless Sensor Network”. IEEE transactions on

wireless communications,vol. 12, no. 2, February

2013.

[8] R.Divya, T.Thirumurugan., “A Novel Dynamic

Key Management Scheme Based On Hamming

Distance for Wireless Sensor Network”. International

Conference on Computer, ICCCET 2011, 18th &

19th March, 2011.

[9] Haowen Chan, Virgil D. Gligor, Adrian Perrig,

and GautamMuralidharan., “On the Distribution and

Revocation of Cryptographic Keys in Sensor

Networks”, IEEE transactions on dependable and

secure computing, vol. 2, no. 3, july-september 2005.

[10] Donggang Liu, PengNing, “Improving Key Pre-

Distribution with Deployment Knowledge in Static

Sensor Networks”, ACM Journal Name,Vol., No. ,

20, 2006.

K DURAISAMY
Text Box
National Conference on Research Advances in Communication, Computation, Electrical Science and Structures (NCRACCESS-2015)
K DURAISAMY
Text Box
ISSN: 2348 - 8387 www.internationaljournalssrg.org Page 26