Key Management Method in Mobile Scenarios for Heterogeneous Wireless Sensor Networks
CSTR:
Author:
Affiliation:

1.Electric Power Research Institute, State Grid Xinjiang Electric Power Co., Ltd, Urumqi 830011, China;2.Dispatching Control Center, State Grid Xinjiang Electric Power Co., Ltd, Urumqi 830017, China;3.School of Information Science and Engineering, Xinjiang University, Urumqi 830046, China

Clc Number:

TN918

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Mobile wireless sensor networks (MWSNs) support the mobility of nodes, and face more complex security challenges. It is difficult to prevent attackers from launching some extremely destructive attacks, such as node replication attacks and sybil attacks. This paper proposes a safe and efficient key management method under the mobile heterogeneous wireless sensor network model. The proposed method adopts the elliptic curve cryptography encryption algorithm to realize the safe upload of mobile node location information to the base station, and uses the message authentication code based on key hash to realize the identity authentication of the message source. The base station performs statistical analysis on the collected location information of the mobile node to assist in completing the identity authentication and session key establishment between the fixed node and the mobile node. Experimental results show that the proposed method saves network resources during the key establishment process, and can effectively defend against attackers from launching replay attacks, node replication attacks, and sybil attacks, thus enhancing network security.

    Reference
    Related
    Cited by
Get Citation

LI Feng, LI Yaping, ZHANG Zhijun, XIE Peng, GUO Xuerang, YUAN Erdong, QI Lei. Key Management Method in Mobile Scenarios for Heterogeneous Wireless Sensor Networks[J].,2021,36(5):1020-1029.

Copy
Related Videos

Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:August 25,2020
  • Revised:July 06,2021
  • Adopted:
  • Online: September 25,2021
  • Published:
Article QR Code