Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

In recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of da...

Full description

Bibliographic Details
Main Authors: Chin-Ling Chen, Chih-Cheng Chen, De-Kui Li
Format: Article
Language:English
Published: Hindawi Limited 2015-01-01
Series:Journal of Sensors
Online Access:http://dx.doi.org/10.1155/2015/827546
id doaj-f89a087459ac44ae91b31f6275f42d39
record_format Article
spelling doaj-f89a087459ac44ae91b31f6275f42d392020-11-24T23:35:20ZengHindawi LimitedJournal of Sensors1687-725X1687-72682015-01-01201510.1155/2015/827546827546Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor NetworksChin-Ling Chen0Chih-Cheng Chen1De-Kui Li2Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, TaiwanDepartment of Health Policy and Management, Chung Shan Medical University, Taichung 40201, TaiwanDepartment of Information Management, Liaocheng University, Liaocheng, Shandong 252000, ChinaIn recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.http://dx.doi.org/10.1155/2015/827546
collection DOAJ
language English
format Article
sources DOAJ
author Chin-Ling Chen
Chih-Cheng Chen
De-Kui Li
spellingShingle Chin-Ling Chen
Chih-Cheng Chen
De-Kui Li
Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
Journal of Sensors
author_facet Chin-Ling Chen
Chih-Cheng Chen
De-Kui Li
author_sort Chin-Ling Chen
title Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
title_short Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
title_full Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
title_fullStr Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
title_full_unstemmed Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
title_sort mobile device based dynamic key management protocols for wireless sensor networks
publisher Hindawi Limited
series Journal of Sensors
issn 1687-725X
1687-7268
publishDate 2015-01-01
description In recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.
url http://dx.doi.org/10.1155/2015/827546
work_keys_str_mv AT chinlingchen mobiledevicebaseddynamickeymanagementprotocolsforwirelesssensornetworks
AT chihchengchen mobiledevicebaseddynamickeymanagementprotocolsforwirelesssensornetworks
AT dekuili mobiledevicebaseddynamickeymanagementprotocolsforwirelesssensornetworks
_version_ 1725526481202839552