A HIBE using Blockchain for Hierarchical Key Management Approach in Wireless Sensor Networks

International Journal of Electrical and Electronics Engineering
© 2023 by SSRG - IJEEE Journal
Volume 10 Issue 3
Year of Publication : 2023
Authors : Siddiq Iqbal, B. R. Sujatha
pdf
How to Cite?

Siddiq Iqbal, B. R. Sujatha, "A HIBE using Blockchain for Hierarchical Key Management Approach in Wireless Sensor Networks," SSRG International Journal of Electrical and Electronics Engineering, vol. 10,  no. 3, pp. 59-66, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I3P107

Abstract:

This paper proposes a solution to enhance the key management of Wireless Sensor Networks (WSNs) by integrating blockchain technology with Hierarchical Identity-Based Encryption. The aim is to establish a highly secure WSN structure. The current wireless network is improved by incorporating blockchain technology to increase security and reliability. However, the security of key management in dynamic WSNs is threatened by the vulnerability of untrusted Head Nodes(HN) to attack. The presence of an untrusted HN imposes a heavy burden on the sensors for key management, in addition to the already existing challenges. In order to overcome these issues, blockchain technology has been used to propose a secure key management scheme (BSKM). We offer a secure node movement technique and a safe cluster-building mechanism, with the blockchain acting as a trust machine to replace the major functions of the Head node. We run extensive simulations for security analyses. The findings show that the BSKM scheme is efficient and effective and is more suitable for enhancing the reliability of dynamic WSNs.

Keywords:

Blockchain, Hierarchical Identity-Based Encryption, Key management.

References:

[1] Nickolaos Koroniotis et al., "The Sair-Iiot Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIot-Based Smart Airports," IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, 2023.
CrossRef | Google Scholar | Publisher Link
[2] Rajakumar Arul et al., "A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario," IEEE Transactions on Industrial Informatics, vol.16, no. 1, pp. 681-690, 2019.
CrossRef | Google Scholar | Publisher Link
[3] Sk.Md.Mizanur Rahman, and Khalil El-Khatib, "Private Key Agreement and Secure Communication for Heterogeneous Sensor Networks,” Journal of Parallel and Distributed Computing, vol. 70, no. 8, pp. 858-870, 2010.
CrossRef | Google Scholar | Publisher Link
[4] Xiaojiang Du et al., “An Effective Key Management Scheme for Heterogeneous Sensor Networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, 2007.
CrossRef | Google Scholar | Publisher Link
[5] Siddiq Iqbal, and B. R. Sujatha, “Secure Key Management Scheme for Hierarchical Network Using Combinatorial Design,” Journal of Information Systems and Telecommunication (JIST, vol. 10, no. 37, p. 20, 2022.
CrossRef | Google Scholar | Publisher Link
[6] B. Murugeshwari et al., "Trust Aware Privacy Preserving Routing Protocol for Wireless Adhoc Network," International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 362-370, 2022.  
CrossRef | Publisher Link
[7] Sencun Zhu, Sanjeev Setia, and Sushil Jajodia, “LEAP+ Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” ACM Transactions on Sensor Networks (TOSN), pp. 62-72, 2003.
CrossRef | Google Scholar | Publisher Link
[8] Y. Akshatha, A. S. Poornima, and M. B. Nirmala, "Secure Data Collection in Clustered Wireless Sensor Networks Using Fuzzy Based Scheme to Detect Malicious Data Collector," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 240-248, 2022.
CrossRef | Publisher Link
[9] Rolf Blom, “An Optimal Class of Symmetric Key Generation Systems,” Workshop on the Theory and Application of Cryptographic Techniques, vol. 209, pp. 335-338, 1984.
CrossRef | Google Scholar | Publisher Link
[10] R.Rajesh, and Dr.K.Ramakrishnan, "An Assessment of Key Management Using Certificateless Cryptography in Mobile Adhoc Network,” International Journal of Computer & Organization Trends (IJCOT), vol. 7, no. 1, pp.18-2, 2017.  
CrossRef | Publisher Link
[11] Diego Ongaro, and John Ousterhout, “In Search of an Understandable Consensus Algorithm,” 2014 USENIX Annual Technical Conference (Usenix ATC 14), pp. 305-319. 2014.
Google Scholar | Publisher Link
[12] Sarmadullah Khan et al., "Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices," IEEE Access, vol. 7, pp. 170615 – 170628, 2019.
CrossRef | Google Scholar | Publisher Link
[13] Ashwag Albakri, Lein Harn, and Sejun Song, “Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN),” Security and Communication Networks, vol. 2019, pp. 1-11, 2019.
CrossRef | Google Scholar | Publisher Link
[14] Mojtaba  Jamshidi et al., “A Hybrid Key Pre- Distribution Scheme for Securing Communications in Wireless Sensor Networks,”  JOIV: International Journal on Informatics Visualization, vol. 3, no. 1, pp. 41-46, 2011.
CrossRef | Google Scholar | Publisher Link
[15] E. Sweetline Priya, R. Priya, and R. Surendiran, "Implementation of Trust-Based Blood Donation and Transfusion System Using Blockchain Technology," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp.104-117, 2022.
CrossRef | Publisher Link
[16] Seung-Hyun Seo et al., “Effective Key Management in Dynamic Wireless Sensor Networks,” IEEE Transactions on Information Forensics and Securit, vol. 10, no. 2, pp. 371-383, 2015.
CrossRef | Google Scholar | Publisher Link
[17] V. S. Janani, and M. Devaraju, "An Efficient Distributed Secured Broadcast Stateless Group Key Management Scheme for Mobile Ad Hoc Networks," 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), pp. 1-5, 2022.
CrossRef | Google Scholar | Publisher Link
[18] Chin-Chen Chang, Wei-Yuan Hsueh, and Ting-Fang Cheng, “A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks,” Wireless Personal Communications, vol.89, no. 2, pp. 447-465, 2016.
CrossRef | Google Scholar | Publisher Link
[19] G. Sahitya, N. Balaji, and C. D. Naidu, "An Improved Routing Protocol for Heterogeneous Wireless Sensor Networks," International Journal of Engineering Trends and Technology, vol. 70, no. 10, pp. 79-86, 2022.
CrossRef | Publisher Link
[20] R. Surendiran, and K. Alagarsamy, "Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption," International Journal of Engineering Trends and Technology, vol. 4, no. 5, pp. 2217-2224, 2013.
CrossRef | Publisher Link
[21] D. Larimer, “Delegated Proof-of-Stake (DPOS),” Bitshare White Paper, Murska Sobota, Slovenia, 2014. 
[22] Youliang Tian et al., “A Blockchain-Based Secure Key Management Scheme with Trustworthiness in DWSNs,” IEEE Transactions on Industrial Informatics, vol. 16, no. 9, 2020.
CrossRef | Google Scholar | Publisher Link
[23] Karpaga Priya R et al., "A Novel Spider Swarm Optimized Energy and Security Aware Clustering Protocol for Smart Grid Wireless Sensor Network," SSRG International Journal of Electrical and Electronics Engineering, vol. 9, no. 10, 2022.
CrossRef | Publisher Link
[24] B Srinuvasu Kumar, S.G. Santhi, and S. Narayana, "A Novel Method for Enhancing the Network Lifetime Using Energy-Efficient Routing Protocol Approach for Wireless IoT Sensor Network Applications," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 277-287, 2022.
CrossRef | Publisher Link
[25] Mcconaghy et al., "Bigchaindb: A Scalable Blockchain Database,” White Paper, Bigchaindb, 2016.
Google Scholar
[26] R.Sharmila, P.C.Gopi, and Dr.V.Vijayalakshmi ,”A Survey of Key Management Schemes in Wireless Sensor Networks,” International Journal of Computer & Organization Trends (IJCOT), vol. 3, no. 5, pp. 48-52, 2013.
Google Scholar | Publisher Link
[27] R. Surendiran, “Similarity Matrix Approach in Web Clustering,”  Journal of Applied Science and Computations, vol. 5, no. 1, pp. 267-272, 2018.
Google Scholar | Publisher Link
[28] Yan Liu, Xiumei Wu, and Xuemin Chen, “A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption,”   2015 IEEE 12th International Conference on Networking, Sensing and Control, pp. 539-543, 2015.
CrossRef | Google Scholar | Publisher Link
[29] Gabin Heo, Kijoon Chae, and Inshil Doh, "Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing,” IEEE Access, vol. 10, pp. 27990-28003, 2022.
CrossRef | Google Scholar | Publisher Link
[30] Sheikh Munir Skh Saad, Raja Zahilah Raja Mohd Radzi, and Siti Hajar Othman, "Comparative Analysis of the Blockchain Consensus Algorithm between Proof of Stake and Delegated Proof of Stake," 2021 International Conference on Data Science and Its Applications (ICoDSA), 2021.
CrossRef | Google Scholar | Publisher Link
[31] S. Gavaskar, E. Ramaraj, and R. Surendiran, “A Compressed Anti IP Spoofing Mechanism Using Cryptography,”  International Journal of Computer Science and Network Security, vol. 12, no. 11, pp. 137-140, 2012. 
Google Scholar | Publisher Link