Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis of Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management

G. Vetrichelvi, Dr.G. Mohankumar


Wireless sensor networks (WSNs) are a technology of various uses from monitoring surrounding environment to collecting data. Because WSNs operate with limited resources of sensor nodes, its life is extended by cluster-based routing methods. Wireless sensor networks routing protocols always neglect security problem at the designing step, while plenty of solutions of this problem exist, one of which is using key management. Most of them were designed for flat wireless sensor networks, which is not fit for cluster-based wireless sensor networks (e.g. LEACH). In this paper, we investigate adding security to cluster-based routing protocols for wireless sensor networks uses improved Random Pair-wise Keys (RPK) scheme, an optimized security scheme that relys on symmetric-key methods; is lightweight and preserves the core of the original LEACH called R LEACH. WSNs quite vulnerable and their sensor nodes have very limited communication and computing capacities and a small memory space. For these reasons, it is difficult to apply the established public key encryption technology. Accordingly, a large number of sensor nodes should be tolerable to errors and failures, and it is essential to achieve effective management and reinforced security functions through autonomous network construction. The cluster-based routing protocol proposed in this study showed energy-efficient key management by establishing a common shared key through the key of key ring or through authentication by a reliable institution.


Cluster-based Routing, Secure Protocol, Shared Key, Key Management Scheme

Full Text:



Kemal a and Mohamed y. a Survey on Protocols for WSNs. Commu-nications Magazines, 2002, 40(8), pages 102-114.

w. Heinzelman, a. Chandrakasan, h. Balakrishnan, Energy-efficient com-munication protocol for WSNs, in: Proceeding of the Hawaii International Conference System Sciences, Hawaii, January 2000.

s. Lindsey, c.s. Raghavendra, pegasis: power efficient gathering in sensor information systems, in: Proceedings of the ieee Aerospace Conference, Big Sky, Montana, March 2002.

m. Younis, m. Youssef, k. Arisha, Energy-aware in cluster-based sensor networks, in: Proceedings of the 10th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS2002), Fort Worth, TX, October 2002.

Eschenauer L, Gligor V D. A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security. USA: ACM, pages 41-47, 2002.

Chan H, Perrig A, Song D. Random key pre-distribution schemes for sensor networks. In Proceedings of the IEEE Computer Society Symposium on Security and Privacy. Piscataway, USA: IEEE, pages 197-213, 2003.

Kejie Lu, Yi Qian, Mohsen Guizani and Hsiao-Hwa Chen. A framework for a distributed key management scheme in heterogeneous WSNs.Wireless Communications, IEEE Transactions on Volume 7, Issue 2, Pages: 639- 647, February 2008.

Yun Zhou and Yuguang Fang. A Two-Layer Key Establishment Scheme for WSNs. Mobile Computing, IEEE Transactions on Volume 6, Issue 9, Pages: 1009 - 1020, Sept. 2007.

Wenliang Du, Jing Deng, Yunghsiang S.Han, Pramod K.Varshney. A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions on Dependable and Secure Computing, Vol.3, NO.1, pages 62-77, January-March 2006.

Leonardo B. Oliveira, Hao C. Wong, M. Bern, A. A. F. Loureiro. SecLEACH-A Random Key Distribution Solution for Securing Clustered Sensor Networks. The Fifth IEEE International Symposium on Network Computing and Applications (NCA’06), 2006.

Energy Efficient key management protocol in wireless sensor networks, Jhunsu Kim and Jhunyung Lee. International Journal of Security and Its Applications ,Vol. 4, No. 2, April, 2010

Eschenauer and V. D. Gligor, “A key management scheme for distributed sensor networks”, In 9th ACM conference on Computer and communications security, 2002, pp. 41-47.

W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key pre-distribution scheme for wireless sensor networks”, ACM Transactions on Information and System Security, Vol. 8, 2005, pp 228-258.

J. Hwang and Y. Kim, "Revisiting random key predistribution schemes for sensor networks," In 2nd ACM workshop on Security of ad hoc and networks, pp. 43-52, 2004.

D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor networks”, ACM Transactions on Information and System Security (TISSEC), Vol. 8, 2005, pp. 41-77.

S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks”, In 10th ACM conference on Computer and communication security, 2003, pp. 62-72.

T. Moore, “A Collusion Attack on Pair-wise Key Predistribution Schemes For Distributed Sensor Networks”, proceedings of the Fourth Annual IEEE International Conference Pervasive Computing and Communications Workshops (PERCOMW06), Mar. 2006, pp. 13-17.

C. Hartung, J. Balasalle and R. Han, “Node Compromise in Sensor Networks: The Need for Secure Systems”, Technical Report CU-CS-990-05, Jan. 2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.