Title: A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks

Authors: Cory J. Antosh, Barry E. Mullins, Rusty O. Baldwin, Richard A. Raines

Addresses: Department of Electrical and Computer Engineering, Center for Cyberspace Research, Air Force Institute of Technology, 2950 Hobson Way, Wright Patterson AFB, OH 45433, USA. ' Department of Electrical and Computer Engineering, Center for Cyberspace Research, Air Force Institute of Technology, 2950 Hobson Way, Wright Patterson AFB, OH 45433, USA. ' Department of Electrical and Computer Engineering, Center for Cyberspace Research, Air Force Institute of Technology, 2950 Hobson Way, Wright Patterson AFB, OH 45433, USA. ' Department of Electrical and Computer Engineering, Center for Cyberspace Research, Air Force Institute of Technology, 2950 Hobson Way, Wright Patterson AFB, OH 45433, USA

Abstract: As wireless sensor networks (WSNs) become more prolific, the need to secure their communications increases. This paper describes the impact of using three rekey protocols – pair-wise, hierarchical and secure lock – for a WSN using the Hubenko architecture. The performance of each protocol is evaluated within a Matlab simulation to determine the impact of each on the number of bits transmitted, total power required and memory occupied. Results indicate that the Hubenko architecture does significantly increase system performance with the selection of the rekey protocol being driven by the size of the network and available memory. In terms of the number of bits transmitted, secure lock is the most efficient for small networks, while hierarchical is best for networks of 500 or more nodes. In terms of memory used, secure lock performs best for small networks, while hierarchical is best for networks with 100 or more nodes.

Keywords: GKM; group key management; keying protocols; multicasting; security; simulation; WSN; wireless sensor networks; wireless networks; Hubenko architecture; secure lock; hierarchical.

DOI: 10.1504/IJAACS.2010.033386

International Journal of Autonomous and Adaptive Communications Systems, 2010 Vol.3 No.3, pp.350 - 368

Published online: 01 Jun 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article