Attack Resistant Agent Based Dynamic Key Management in Dynamic Wireless Sensor Networks

  • Authors

    • Riaz Shaik
    • Shaik Shakeel Ahamad
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15566
  • Wireless Sensor Network (WSN), key management, security, dynamic key management system, agent-based key distribution, attack resiliency.
  • The adaptation of Wireless Sensor Network (WSN) and its utility in real world applications like healthcare is growing faster. With its growth, it also brought vulnerabilities that cause security attacks. It is more so with the emerging technology known as Internet of Things (IoT) which combines physical and digital worlds. At least, as far as WSN is concerned, it is inevitable to have end to end security to protect communications that are sensitive and confidential.Many security schemes came into existence as found in the literature. However, most of them are inefficient for dynamic key management in dynamic WSN. Recently we proposed a scheme named as Agent Based Dynamic Key Management (ABDKM). In this paper we enhance and evaluate it against various attacks such as black hole and rushing.The enhanced scheme is named as an Attack Resilient-Agent Based Dynamic Key Management (AR-ABDKM). The scheme is implemented using NS2. The simulation results showed the remarkable performance improvement of the proposed scheme besides its attack resiliency.

     

     

  • References

    1. [1] Pardeep Kumar1andPawani Porambage1. (2013). A Mobile Object-based Secret Key Distribution Scheme for Wireless Sensor Networks., p656-660.

      [2] Yongcan Cao, Member, IEEE, Wenwu Yu, Member, IEEE, Wei Ren, Member, IEEE, and Guanrong Chen, Fellow and IEEE. (2011). An Overview of Recent Progress in the Study of Distributed Multi-agent Coordination, p1-20.

      [3] Olivier Boissiera, Rafael H. Bordinib, Jomi F. Hubnerc, Alessandro Riccid and Andrea Santid. (2011). Multi-Agent Oriented Programming with JaCaMo. p1-26.

      [4] T. Crooks and Alison J. Heppenstall. (2012). Introduction to Agent-Based Modelling,p85-105.

      [5] Zhu Wanga, Lingfeng Wang a,?, Anastasios I. Dounis b and Rui Yang a. (2012). Multi-agent control system with information fusion based comfort model for smart buildings. Elsevier, p247-254.

      [6] Asmae BLILAT, Anas BOUAYAD, Nour el houda CHAOUI, Mohammed EL GHAZI LTTI laboratory Sidi Mohamed Ben Abdellah University, FezandMorocco. (2012). Wireless Sensor Network: Security challenges, p68-72.

      [7] P. H. Nguyen, Member, IEEE, W. L. Kling, Member, IEEE, and P. F. Ribeiro, Fellow and IEEE. (2013). A Game Theory Strategy to Integrate Distributed Agent-Based Functions in Smart Grids. p568-576.

      [8] Yuan Fana,1, Gang Fengb, Yong Wangc and Cheng Songd. (2013). Distributed event-triggered control of multi-agent systems with combinational measurements?. Elsevier, p1-675.

      [9] Yu Zhao, Zhisheng Duan, Guanghui Wen and Yanjiao Zhang. (2013). Distributed finite-time tracking control for multi-agent systems: An observer-based approach. Elsevier. 62, p22-28.

      [10] Georg S. Seyboth a,1, Dimos V. Dimarogonasb and Karl H. Johansson b. (2013). Event-based broadcasting for multi-agent average consensus. Elsevier, p245-252.

      [11] Huang Lu, Student Member, IEEE, Jie Li, Senior Member, IEEE, and Mohsen Guizani, FellowandIEEE. (2014). Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks. MICANS INFOTECH. 25 , p750-761.

      [12] Seung-Hyun Seo, Member, IEEE, Jongho Won, Student Member, IEEE, Salmin Sultana, Member, IEEE, and Elisa Bertino, FellowandIEEE. (2015). Effective Key Management in Dynamic Wireless Sensor Networks. Purdue e-Pubs. 10 , p371-382.

      [13] Johnson c. lee and Victor c. m. leung, University of British columbia kirk h. wong, jiannong cao, and henry c. b. chanandhong kong polytechnic university. Key management issues in wireless sensor networks: current proposals and future developments., p76-83.

      [14] Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh. (2013). A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 12 , p953-959.

      [15] Sushmita Ruj, Member, IEEE, Amiya Nayak, Senior Member, IEEE, and Ivan Stojmenovic, Fellow and IEEE. (2013). Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications.62, p2224-2237.

      [16] Filippo Gandino, Member, IEEE, Bartolomeo Montrucchio, Member, IEEE, and Maurizio Rebaudengo, MemberandIEEE. (2014). Key Management for Static Wireless Sensor Networks With Node Adding. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS. 10 , p1133-1143.

      [17] Wenjun Gu, Neelanjana Dutta, Sriram Chellappan and Xiaole Bai. (2011). Providing End-to-End Secure Communications in Wireless Sensor Networks, p205-218.

      [18] Patrick Traynor, Student Member, IEEE, Raju Kumar, Heesook Choi, Student Member, IEEE, Guohong Cao, Senior Member, IEEE, Sencun Zhu, and Thomas La Porta, FellowandIEEE. (2007). Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING. 6 , p663-677.

      [19] Ozgur Koray Sahingoz. (2007). Agent-based fault tolerant distributed event system.26 , p489-506.

      [20] Neeraj Nehra1andR.B.Patel2. (2008). MASLKE: Mobile Agent Based Secure Location Aware Key Establishment in Sensor Networks., p1-6.

      [21] Ozgur Koray Sahingoz . (2013). Large scale wireless sensor networks with multi-level dynamic key management scheme. Elsevier, p1-7.

      [22] Zdravko Karakehayov,. (2005). Using reward to detect team black-hole attacks in wireless sensor networks. Computational Sciences and Engineering Division, p.1-9.

      [23] Nitesh Gondwal, Chander Diwaker. (2013). detecting blackhole attack in wsn by check agent using multiple base stations.American International Journal of Research in Science, Technology, Engineering & Mathematics, p.345-440.

      [24] Ms.B.R.Baviskar,Mr.V.N.Patil. (2014). black hole attacks mitigation and prevention in wireless sensor network.International Journal of Innovative Research in Advanced Engineering (IJIRAE. 1 (4), p.123-135.

      [25] Ms.B.R.Baviskar, Mr.V.N.Patil. (2014). Black hole Attacks Prevention in Wireless Sensor Network by Multiple Base Station Using of Efficient Data Encryption Algorithms. International Journal of Advent Research in Computer & Electronics. 1 (2), p.234-305.

      [26] Gulshan Kumar, Mritunjay Rai and Gang-soo Lee “Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement†International Journal of Security and Its Applications Vol. 6, No. 1, January, 2012.

      [27] L. Lazos, R. Poovendran, C. Meadows, P. Syverson and L. W. Chang. (n.d). Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach (n.d), p1-7.

      [28] Riaz Shaik,Shaik Shakeel ahamad (2017). An Agent-Based Hybrid Approach for Dynamic Key Management System in Dynamic Wireless Sensor Network.(JARDCS) journal of advanced research in dynamical and control systems-vol-9,issue-2-OCT-2017.

      [29] Riaz Shaik, Shaik Shakeel Ahamad, Enhanced Attack Resistant Agent Based Dynamic Key Management in Dynamic Wireless Sensor Networks. International Journal of Civil Engineering and Technology, 8(12), 2017, pp. 69–76.

      [30] Riaz Shaik; Shaik Shakeel Ahamad, Key Management Schemes of Wireless Sensor Networks -A Survey. Fronteiras: Journal of Social, Technological and Environmental Science •v.6, n.2, may-august. 2017.

  • Downloads

  • How to Cite

    Shaik, R., & Shakeel Ahamad, S. (2018). Attack Resistant Agent Based Dynamic Key Management in Dynamic Wireless Sensor Networks. International Journal of Engineering & Technology, 7(2.32), 195-200. https://doi.org/10.14419/ijet.v7i2.32.15566