Skip to main content

Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

Security is one of the important and challenging aspects in wireless sensor network owing to their wireless nature combined with limited memory, energy, and computation. We can classify security issue of the wireless sensor network into five broad categories as cryptography techniques, key management, routing protocols, intrusion detection and data aggregation. Since the key management forms an underlying factor for efficient routing protocol and cryptography in wireless sensor network, we focus on key management issue. This paper outlines the constraints, security requirements and attacks, which are related to the key management and routing. Further novel classification of key distribution schemes have been proposed. The proposed novel classification and comparison distinctly brings to the fore gaps in the existing solutions of research which can be put to use by researchers in the area to identify current challenges for designing efficient key distribution scheme. The paper concludes with possible future research directions on key distribution in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yong, W., et al.: A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials 8, 2–23 (2006)

    Google Scholar 

  2. Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEEE Wireless Communications 11, 6–28 (2004)

    Article  Google Scholar 

  3. Kausar, F., et al.: Key Management and Secure Routing in Heterogeneous Sensor Networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2008, pp. 549–554 (2008)

    Google Scholar 

  4. Habib, A.: Sensor network security issues at network layer. In: 2nd International Conference on Advances in Space Technologies, ICAST 2008, pp. 58–63 (2008)

    Google Scholar 

  5. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE, International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)

    Google Scholar 

  6. Huijuan, D., et al.: Selective forwarding attack detection using watermark in WSNs. In: ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, pp. 109–113 (2009)

    Google Scholar 

  7. Newsome, J., et al.: The Sybil attack in sensor networks: analysis & defenses. In: Third International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259–268 (2004)

    Google Scholar 

  8. Hu, Y.C., et al.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003, vol. 3, pp. 1976–1986. IEEE Societies (2003)

    Google Scholar 

  9. Kaiping, X., et al.: Security improvement on an efficient key distribution mechanism for large-scale Wireless Sensor Network. In: 2nd International Conference on Anti-Counterfeiting, Security and Identification, ASID 2008, pp. 140–143 (2008)

    Google Scholar 

  10. Haowen, C., et al.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  11. Wenliang, D., et al.: A key management scheme for wireless sensor networks using deployment knowledge. In: Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004, 597 p. (2004)

    Google Scholar 

  12. Ibriq, J., Mahgoub, I.: A Hierarchical Key Establishment Scheme forWireless Sensor Networks. In: 21st International Conference on Advanced Information Networking and Applications, AINA 2007, pp. 210–219 (2007)

    Google Scholar 

  13. Pathan, A.S.K., Choong Seon, H.: Feasibility of PKC in resource-constrained wireless sensor networks. In: 11th International Conference on Computer and Information Technology, ICCIT 2008, pp. 13–20 (2008)

    Google Scholar 

  14. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor network. In: 9th ACM Conference on Computer and Communications Security, Washington DC, pp. 41–47 (2002)

    Google Scholar 

  15. Tasci, S.E., et al.: Simple and Flexible Random Key Predistribution Schemes for Wireless Sensor Networks Using Deployment Knowledge. In: International Conference on Information Security and Assurance, ISA 2008, pp. 488–494 (2008)

    Google Scholar 

  16. Lu, K., et al.: A framework for distributed key management schemes in heterogeneous wireless sensor networks. In: 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006, p. 7, 520 (2006)

    Google Scholar 

  17. Xiaojiang, D., et al.: A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks. In: IEEE International Conference on Communications, ICC 2007, pp. 3407–3412 (2007)

    Google Scholar 

  18. Banihashemian, S., Bafghi, A.G.: A new key management scheme in heterogeneous wireless sensor networks. In: 2010 The 12th International Conference on Advanced Communication Technology (ICACT), pp. 141–146 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Premraj Mahajan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mahajan, P., Sardana, A. (2012). Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics