| Literature DB >> 30347886 |
Majid R Alshammari1, Khaled M Elleithy2.
Abstract
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced encryption standard (AES-128) for encrypting and validating the transmitted data. However, the standard does not specify how to manage, store, or distribute the encryption keys. Many solutions have been proposed to address this problem, but the majority are impractical in resource-constrained devices such as wireless sensor nodes or cause degradation of other metrics. Therefore, we propose an efficient and secure key distribution protocol that is simple, practical, and feasible to implement on resource-constrained wireless sensor nodes. We conduct simulations and hardware implementations to analyze our work and compare it to existing solutions based on different metrics such as energy consumption, storage overhead, key connectivity, replay attack, man-in-the-middle attack, and resiliency to node capture attack. Our findings show that the proposed protocol is secure and more efficient than other solutions.Entities:
Keywords: key distribution; resource-constrained nodes; wireless sensor networks
Year: 2018 PMID: 30347886 PMCID: PMC6211067 DOI: 10.3390/s18103569
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Classification of key distribution schemes in WSNs.
Evaluation Metrics.
| Metric | Definition | |
|---|---|---|
| Efficiency | Energy consumption | The amount of energy consumed during the key distribution/key establishment process. |
| Storage overhead | The memory required to store keys or keys materials. | |
| Key connectivity | The percentage of available links in a WSN, calculated as the number of secured links divided by the total links. | |
| Security | Replay attack | The ability of an adversary to replay any of the corresponding frames. |
| Man-in-the-middle attack | The ability of an adversary to impersonate any sensor node or sink node. | |
| Resiliency to node capture attack | The impact percentage of a node capture attack on WSN key connectivity, calculated as the number of compromised links over the number of secured links. |
Notation for the Proposed Protocol.
| Notation | Description |
|---|---|
|
| |
|
| |
|
| |
|
| One-way hash function. |
|
| Concatenation. |
|
| Sending message |
|
| Receiving message |
|
| |
|
| |
|
| Function to compare or verify. |
|
| Probability function. |
|
| Function maps |
|
| Plaintext. |
|
| Cipher text. |
|
| Node identification. |
|
| Timestamp. |
|
| Data. |
Energy consumption of each key distribution scheme.
| Descriptions | Schemes | Our Protocol | Scheme [ | Scheme [ | Scheme [ | Scheme [ | |
|---|---|---|---|---|---|---|---|
| Parameters | |||||||
| The parameters that contribute to the energy consumption of nodes’ transceivers. |
| 1 | 27 | 6 | 95 | 2 | |
|
| 3 | 39 | 13 | 120 | 4 | ||
|
| 1 | 27 | 6 | 95 | 2 | ||
|
| NA | 2 | 201 | NA | NA | ||
|
| 12.29 ms | 159.74 ms | 876.54 ms | 491.52 ms | 16.38 ms | ||
|
| 4.10 ms | 110.59 ms | 847.87 ms | 389.12 ms | 8.19 ms | ||
|
| 0.01 mJ | 0.16 mJ | 0.88 mJ | 0.49 mJ | 0.02 mJ | ||
|
| 2.75 mJ | 46.02 mJ | 295.77 mJ | 150.37 mJ | 4.15 mJ | ||
| The parameters that contribute to the energy consumption of nodes’ microcontroller. |
| 𝒪(1) |
| 𝒪(1) |
| 𝒪( | |
|
| NA | 10.08 ms | NA | 89.31 ms | 170.02 ms | ||
|
| 0.35 ms | NA | NA | NA | NA | ||
|
| 177.82 ms | NA | NA | NA | NA | ||
|
| 982 ms |
| NA | NA | 982 ms | ||
|
| 1502.90 ms |
| NA | NA | 1502.90 ms | ||
|
| NA | NA | 1909.83 ms | NA | NA | ||
|
| 38.35 mJ | 0.15 mJ | 27.50 mJ | 1.29 mJ | 38.23 mJ | ||
| Total energy consumption |
| 41.10 mJ | 46.17 + 2 | 323.28 mJ | 151.65 mJ | 42.39 mJ | |
The key pool size P is equal to the number of sensor nodes multiplied by 10, and is equal to 0.99%. Here, t denotes an unknown time; the time cannot be determined because the scheme involves encryption and decryption during the key distribution process, and the source does not specify the type of encryption and decryption algorithm used.
Key Storage overhead for each scheme.
| Scheme | Key Storage Overhead |
|---|---|
| The proposed protocol | 3 |
| Scheme [ |
|
| Scheme [ | 6 |
| Scheme [ |
|
| Scheme [ |
|
n represents the number of nodes. The key pool size p is equal to the number of sensor nodes multiplied by 10, and is equal to 0.99%.
Figure 2The magnitude of key storage overhead.
Figure 3Modeling a WSN: (a) random deployment of sensor nodes; (b) wireless signal range of nodes’ transceivers.
Figure 4Key connectivity after implementing key distribution/establishment process for each scheme. (a) the proposed protocol; (b) Scheme [26]; (c) Scheme [35]; (d) Scheme [36] ; (e) scheme [37].
Figure 5Schemes’ resilience against node capture attacks. (a) The proposed protocol; (b) Scheme [26]; (c) Scheme [35]; (d) Scheme [36] ; (e) Scheme [37].
Figure 6Verification result of reachability and secrecy.
Figure 7Verification result of authentication.
Figure 8Verification result of observational equivalence.
Experiment Parameters.
| Description | Parameters | Values |
|---|---|---|
|
| Data Rate | 250 kbps |
| Frame Size | 1024 bits | |
| Transmission power | 0 dBm | |
| Modulation | bpsk | |
| Receiver Sensitivity | ||
|
| Tx Current draw | 45 mA @ 3.3 VDC |
| Rx Current draw | 50 mA @ 3.3 VDC | |
|
| Microcontroller | 3.2 mA @ 4.5 V |
|
| Tx power consumption | 148.5 mW |
| Rx power consumption | 165 mW | |
| Microcontroller power consumption | 14.4 mW |