Abstract
Wireless sensor networks as the key infrastructure of the new networking paradigm are vulnerable against different kinds of attacks. Therefore, ensuring a secure communication between the sensor nodes is important. One of the most critical issues in this regard is the key distribution mechanism. Due to the random deployment of the sensors in the target area, key pre-distribution is a promising approach, in which a list of keys, so-called key-ring, is pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share a common key from their key-rings. In this paper, we consider a hybrid key pre-distribution approach based on the symmetric design. We propose a new scheme, which is a modification of the hybrid symmetric design in order to improve the connectivity and resilience. Considering the trade-off between resilience and connectivity, we introduce a new parameter based on the application requirement. The experimental results and analytical analysis approve the efficiency of our proposed approach and introduced parameter.
Similar content being viewed by others
References
Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.
Anderson, I. (1990). Combinatorial designs: Construction methods. Chicester: Ellis Horwood.
Anzani, M., Haj Seyyed Javadi, H., & Moeini, A. (2016). A deterministic key predistribution method for wireless sensor networks based on hypercube multivariate scheme. Iranian Journal of Science and Technology, Transactions A: Science. doi:10.1007/s40995-016-0054-3.
Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948–959.
Blom, R. (1985). An optimal class of symmetric key generation systems. In Proceeding of eurocrypt, advances in cryptology (pp. 335–338). Springer.
Blundo, C., Santi, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992). Perfectly-secure key distribution for dynamic conferences. In Proceeding, advances in cryptology (CRYPTO 92) (pp. 471–486).
Boyd, C., & Mathuria, A. (2003). Protocols for authentication and key establishment. In U. Maure & R. L. Rivest (Eds.). Berlin, Heidelberg: Springer.
Camtepe, S. A., & Yener, B. (2004). Combinatorial design of key distribution mechanisms for wireless sensor networks. In P. Samarati, P. Y. A. Ryan, D. Gollmann, & R. Molva (Eds.), ESORICS, volume 3193 of Lecture Notes in Computer Science (pp. 293–308). Springer.
Camtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), 346–358.
Chakrabarti, D., Maitra, S., & Roy, B. (2006). A key predistribution scheme for wireless sensor networks: Merging blocks in combinatorial design. International Journal of Information Security, 5(2), 105–114.
Chan, H., Perring, A., & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceeding of IEEE Symposium on Security and Privacy (pp. 197–213).
Chen, C. Y., & Chao, H. C. (2014). A survey of key distribution in wireless sensor networks. Security and Communication Networks, 7(12), 24952508.
Colbourn, C. J., & Dinitz, J. H. (Eds.). (2007). Handbook of combinatorial designs (2nd ed.). Boca Raton: CRC Press.
Conti, M., Di Pietro, R., Mancini, L. V., & Mei, A. (2009). Mobility and cooperation to thwart node capture attacks in manets. EURASIP Journal on Wireless Communications and Networking, 2009, 1–13.
Dargahi, T., Haj Seyyed Javadi, H., & Hosseinzadeh, M. (2015). Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Security and Communication Networks, 8(8), 1561–1574.
Ehdaie, M., Alexiou, N., Ahmadian Attari, M., Aref, M. R., & Papadimitratos, P. (2015). Key splitting: Making random key distribution schemes resistant against node capture. Security and Communication Networks, 8, 431–445.
Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceeding of the 9th ACM conference on computer and communications security (pp. 41–47).
Javanbakht, M., Erfani, H., Haj Seyyed Javadi, H., & Daneshjoo, P. (2014). Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs. Security and Communication Networks, 7(11), 2003–2014.
Kavitha, T., & Sridharan, D. (2010). Hybrid design of scalable key distribution for wireless sensor networks. IACSIT International Journal of Engineering and Technology, 2(2), 136–141.
Lee, J., & Stinson, D. (2005). A combinatorial approach to key pre-distribution for distributed sensor networks. In IEEE wireless communications and networking conference (WCN’ 05), IEEE Communication Society (pp. 1200–1205).
Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.
Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2014). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80(4), 1347–1362.
Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.
Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1990). Handbook of applied cryptography. New York: CRC Press.
Qian, S. (2012). A novel key pre-distribution for wireless sensor networks. Physics Procedia, 25, 2183–2189.
Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.
Ruj, S., & Roy, B. (2007). Key pre-distribution using partially balanced designs in wireless sensor networks. In 5th International symposium (ISPA) (pp. 431–445). Springer.
Srinivasa, K., Poornima, V., Archana, V., Reshma, C., Venugopal, K., & Patnaik, L. (2008). Combinatorial approach to key generation using multiple key spaces for wireless sensor networks. In ADCOM 2008, IEEE (pp. 279–284).
Stinson, D. (2004). Combinatorial designs: Construction and analysis. Berlin: Springer.
Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52, 2292–2330.
Zhang, J., & Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33(2), 63–75.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Anzani, M., Haj Seyyed Javadi, H. & Modirir, V. Key-management scheme for wireless sensor networks based on merging blocks of symmetric design. Wireless Netw 24, 2867–2879 (2018). https://doi.org/10.1007/s11276-017-1509-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-017-1509-y