Cluster forming based on spatial information using HMAC in WSN
Main Article Content
Abstract
The wireless sensor can be considered as one of the most major technologies through using it in different application such as environmental applications, military applications, commercial applications, health applications and agriculture applications. Due to the sensor networks may be deployed in open area (uncontrolled area), especially in military applications. In such situations, the nodes are vulnerable to be captured. Moreover, data/control packets may be intercepted and/or modified due to the transmission nature.
Consequently, security services such as authentication and encryption done by key management which is not trivial task. The key management is important to maintain the network operations. The proposed scheme the nodes based on spatial information with data sequence then sends encryption message to each other in secure way by HMAC for providing safe links between the nodes in the network and forming the clusters. Consequently, the proposed scheme covers the security goals and authentication of each node.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Tikrit Journal of Pure Science is licensed under the Creative Commons Attribution 4.0 International License, which allows users to copy, create extracts, abstracts, and new works from the article, alter and revise the article, and make commercial use of the article (including reuse and/or resale of the article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made, and the licensor is not represented as endorsing the use made of the work. The authors hold the copyright for their published work on the Tikrit J. Pure Sci. website, while Tikrit J. Pure Sci. is responsible for appreciate citation of their work, which is released under CC-BY-4.0, enabling the unrestricted use, distribution, and reproduction of an article in any medium, provided that the original work is properly cited.
References
[1] K. Rasul, N. Nuerie, and A. S. K. Pathan, 2010,"An Enhanced Tree-Based Key anagement Scheme for Secure Communication in Wireless Sensor Network," in High Performance Compu-ting and Communications (HPCC), 12th IEEE In-ternational Conference , pp. 671-676.
[2] Y. Zhang and J. Pengfei, 2014, "An efficient and hybrid key management for heterogeneous wireless sensor networks," in The 26th Chinese Control and Decision Conference (CCDC), pp. 1881-1885.
[3] A. Tajeddine, A. Kayssi, A. Chehab, and I. Elhajj, 2014, "Authentication schemes for wire-less sensor networks," in MELECON 17th IEEE Mediterranean Electrotechnical Conference, pp. 367-372.
[4] F. Legendre, G. Dequen, and M. Krajecki, 2012, "Encoding Hash Functions as a SAT Prob-lem," in IEEE 24th International Conference on Tools with Artificial Intelligence, pp. 916-921.
[5] A. A. Alkandari, I. F. T. Alshaikhli, and M. A. Alahmad, 2013, "Cryptographic hash function: A high level view,",IEEE International Conference on Informatics and Creative Multimedia, PP. 128-134.
[6] M. I. Salam, P. Kumar, and L. HoonJae, 2010, "An efficient key pre-distribution scheme for wireless sensor network using public key cryptography," in Networked Computing and A-dvanced Information Management (NCM), Sixth International Conference on, pp. 402-407.
[7] R. K. Kodali, 2014, "Key management tech-nique for WSNs," in Region 10 Symposium, IEEE, pp. 540-545.
[8] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, 2000, "Energy-efficient commu-nication protocol for wireless microsensor net-works," in System Sciences, Proceedings of the 33rd Annual Hawaii International Conference on, p. 10 pp. vol.2.
[9] A. C. Shakir, J. Min, and G. Xuemai, 2012, "Elliptic Curve Cryptography Based Scheme for Key Predistribution in the Heterogeneous Wirel-ess Sensor Network," wulfenia, vol. 19, pp. 131-142.
[10] E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, 2006, "Recommendation for key man-agement-part 1: General (revised," in NIST sp-ecial publication.
[11] R. Yasmin, 2012, "An efficient authenticat-ion framework for wireless sensor networks," Ph.D, thesis, University of Birmingham.
[12] T. Lalitha and A. J. Devi, 2014, "Security in Wireless Sensor Networks: Key Management Module in EECBKM," in Computing and Commu-nication Technologies (WCCCT), World Congress on, pp. 306-308.
[13] G. Gulhane and N. V. Mahajan, 2014, "Sec-uring Multipath Routing Protocol Using Authen-tication Approach for Wireless Sensor Networ-k," in Communication Systems and Network Tec-hnologies (CSNT), Fourth International Confere-nce on, pp. 729-733.
[14] P. R. Vamsi and K. Kant, 2014, "A light-weight Sybil attack detection framework for Wi-reless Sensor Networks," in Contemporary Com-puting (IC3), Seventh International Conference on, pp. 387-393.
[15] Q. Yang, Q. Li, and S. Li, 2008, "An Efficient Key Management Scheme for Heterogeneous Sensor Networks," in 4th International Confere-nce on Wireless Communications, Networking and Mobile Computing, pp. 1-4.
[16] L. M. C. Arboleda and N. Nasser, 2006, "Co-mparison of Clustering Algorithms and Protoco-ls for Wireless Sensor Networks," in Canadian Conference on Electrical and Computer Enginee-ring, pp. 1787-1792.
[17] N. Bulusu, J. Heidemann, D. Estrin, and T. Tran, 2004,"Self-configuring localization system-s: Design and experimental evaluation," ACM Transactions on Embedded Computing Systems (TECS), vol. 3, pp. 24-60.
[18] K. Rajendiran, R. Sankararajan, and R. Pala-niappan, 2011, "A secure key predistribution sc-heme for WSN using elliptic curve cryptogr-aphy," ETRI Journal, vol. 33, pp. 791-801.
[19] R. Blom, 1984, "An optimal class of symm-etric key generation systems," in Workshop on the Theory and Application of of Cryptographic Techniques, pp. 335-338.
[20] Z. Benenson, F. C. Gärtner, and D. Kesdog-an, 2004, "User Authentication in Sensor Netw-orks," in GI Jahrestagung (2), pp. 385-389.
[21] C. Jiang, B. Li, and H. Xu, 2007, "An efficie-nt scheme for user authentication in wireless sensor networks," in Advanced Information Net-working and Applications Workshops, AINAW-'07. 21st International Conference on, pp. 438-442.
[22] H.-R. Tseng, R.-H. Jan, and W. Yang, 2007, "An improved dynamic user authentication sch-eme for wireless sensor networks," in Global Telecommunications Conference, 2007. GLOBE-COM'07. IEEE, pp. 986-990.
[23] Y. Zhang, X. Li, J. Liu, J. Yang, and B. Cui, 2012, "A secure hierarchical key management scheme in wireless sensor network," Internat-ional Journal of Distributed Sensor Networks,PP. 1-8.
[24] S. Hussain, F. Kausar, and A. Masood, 2007, "An efficient key distribution scheme for heterogeneous sensor networks," in Proceed-ings of the international conference on Wireless communications and mobile computing, pp. 388-392.
[25] B. Maala, H. Bettahar, and A. Bouabdallah, 2008, "TLA: A Tow Level Architecture for Key Management in Wireless Sensor Networks," in Sensor Technologies and Applications, 2008. SENSORCOMM'08. Second International Confer-ence on, pp. 639-644.