Current communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low redundancy in sensed data, and long network lifetime. One major issue that must be addressed is the security of data communication. Due to the limited capabilities of sensor nodes, designing security-based communication protocols present a difficult challenge. Since commonly used encryption schemes require high time complexity and large memory, achieving security for WSNs needs unique approaches. In this paper, we consider a heterogeneous wireless sensor network (HWSN), where while most nodes are resource limited a few nodes can have more energy, stronger processing capability and longer communication range and can be used to relax the resource bottleneck. We propose a joint design approach that can best use the benefit that a HWSN brings. We first design a reconfigurable hierarchical networking architecture, where the HWSN is divided by the high-end nodes into regions, the low-end nodes in each region are divided by clusters, and high-end nodes and cluster heads form a communication/relay backbone. We then design a key management system that uses both public and symmetric key cryptography above the hierarchical networking architecture which requires very small number of security keys. The evaluation and simulation results show that by using the proposed networking architecture and key management scheme only a small amount of keys needs to be preloaded before deployment and stored after key setup to achieve secured communication throughout the entire network.
Comments: 18 Pages.
[v1] 2012-08-18 21:33:29
Unique-IP document downloads: 166 times
Vixra.org is a pre-print repository rather than a journal. Articles hosted may not yet have been verified by peer-review and should be treated as preliminary. In particular, anything that appears to include financial or legal advice or proposed medical treatments should be treated with due caution. Vixra.org will not be responsible for any consequences of actions that result from any form of use of any documents on this website.
Add your own feedback and questions here:
You are equally welcome to be positive or negative about any paper but please be polite. If you are being critical you must mention at least one specific error, otherwise your comment will be deleted as unhelpful.