Skip to main content
Log in

Key-management scheme for wireless sensor networks based on merging blocks of symmetric design

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless sensor networks as the key infrastructure of the new networking paradigm are vulnerable against different kinds of attacks. Therefore, ensuring a secure communication between the sensor nodes is important. One of the most critical issues in this regard is the key distribution mechanism. Due to the random deployment of the sensors in the target area, key pre-distribution is a promising approach, in which a list of keys, so-called key-ring, is pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share a common key from their key-rings. In this paper, we consider a hybrid key pre-distribution approach based on the symmetric design. We propose a new scheme, which is a modification of the hybrid symmetric design in order to improve the connectivity and resilience. Considering the trade-off between resilience and connectivity, we introduce a new parameter based on the application requirement. The experimental results and analytical analysis approve the efficiency of our proposed approach and introduced parameter.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96.

    Article  Google Scholar 

  2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.

    Article  Google Scholar 

  3. Anderson, I. (1990). Combinatorial designs: Construction methods. Chicester: Ellis Horwood.

    MATH  Google Scholar 

  4. Anzani, M., Haj Seyyed Javadi, H., & Moeini, A. (2016). A deterministic key predistribution method for wireless sensor networks based on hypercube multivariate scheme. Iranian Journal of Science and Technology, Transactions A: Science. doi:10.1007/s40995-016-0054-3.

    Article  Google Scholar 

  5. Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948–959.

    Article  Google Scholar 

  6. Blom, R. (1985). An optimal class of symmetric key generation systems. In Proceeding of eurocrypt, advances in cryptology (pp. 335–338). Springer.

  7. Blundo, C., Santi, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992). Perfectly-secure key distribution for dynamic conferences. In Proceeding, advances in cryptology (CRYPTO 92) (pp. 471–486).

    Chapter  Google Scholar 

  8. Boyd, C., & Mathuria, A. (2003). Protocols for authentication and key establishment. In U. Maure & R. L. Rivest (Eds.). Berlin, Heidelberg: Springer.

  9. Camtepe, S. A., & Yener, B. (2004). Combinatorial design of key distribution mechanisms for wireless sensor networks. In P. Samarati, P. Y. A. Ryan, D. Gollmann, & R. Molva (Eds.), ESORICS, volume 3193 of Lecture Notes in Computer Science (pp. 293–308). Springer.

  10. Camtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), 346–358.

    Article  Google Scholar 

  11. Chakrabarti, D., Maitra, S., & Roy, B. (2006). A key predistribution scheme for wireless sensor networks: Merging blocks in combinatorial design. International Journal of Information Security, 5(2), 105–114.

    Article  Google Scholar 

  12. Chan, H., Perring, A., & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceeding of IEEE Symposium on Security and Privacy (pp. 197–213).

  13. Chen, C. Y., & Chao, H. C. (2014). A survey of key distribution in wireless sensor networks. Security and Communication Networks, 7(12), 24952508.

    Google Scholar 

  14. Colbourn, C. J., & Dinitz, J. H. (Eds.). (2007). Handbook of combinatorial designs (2nd ed.). Boca Raton: CRC Press.

    MATH  Google Scholar 

  15. Conti, M., Di Pietro, R., Mancini, L. V., & Mei, A. (2009). Mobility and cooperation to thwart node capture attacks in manets. EURASIP Journal on Wireless Communications and Networking, 2009, 1–13.

    Article  Google Scholar 

  16. Dargahi, T., Haj Seyyed Javadi, H., & Hosseinzadeh, M. (2015). Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Security and Communication Networks, 8(8), 1561–1574.

    Article  Google Scholar 

  17. Ehdaie, M., Alexiou, N., Ahmadian Attari, M., Aref, M. R., & Papadimitratos, P. (2015). Key splitting: Making random key distribution schemes resistant against node capture. Security and Communication Networks, 8, 431–445.

    Article  Google Scholar 

  18. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceeding of the 9th ACM conference on computer and communications security (pp. 41–47).

  19. Javanbakht, M., Erfani, H., Haj Seyyed Javadi, H., & Daneshjoo, P. (2014). Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs. Security and Communication Networks, 7(11), 2003–2014.

    Article  Google Scholar 

  20. Kavitha, T., & Sridharan, D. (2010). Hybrid design of scalable key distribution for wireless sensor networks. IACSIT International Journal of Engineering and Technology, 2(2), 136–141.

    Google Scholar 

  21. Lee, J., & Stinson, D. (2005). A combinatorial approach to key pre-distribution for distributed sensor networks. In IEEE wireless communications and networking conference (WCN’ 05), IEEE Communication Society (pp. 1200–1205).

  22. Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.

    Article  Google Scholar 

  23. Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2014). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80(4), 1347–1362.

    Article  Google Scholar 

  24. Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.

    Article  Google Scholar 

  25. Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.

    Article  Google Scholar 

  26. Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1990). Handbook of applied cryptography. New York: CRC Press.

    MATH  Google Scholar 

  27. Qian, S. (2012). A novel key pre-distribution for wireless sensor networks. Physics Procedia, 25, 2183–2189.

    Article  Google Scholar 

  28. Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.

    Article  MathSciNet  Google Scholar 

  29. Ruj, S., & Roy, B. (2007). Key pre-distribution using partially balanced designs in wireless sensor networks. In 5th International symposium (ISPA) (pp. 431–445). Springer.

  30. Srinivasa, K., Poornima, V., Archana, V., Reshma, C., Venugopal, K., & Patnaik, L. (2008). Combinatorial approach to key generation using multiple key spaces for wireless sensor networks. In ADCOM 2008, IEEE (pp. 279–284).

  31. Stinson, D. (2004). Combinatorial designs: Construction and analysis. Berlin: Springer.

    MATH  Google Scholar 

  32. Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52, 2292–2330.

    Article  Google Scholar 

  33. Zhang, J., & Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33(2), 63–75.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Haj Seyyed Javadi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anzani, M., Haj Seyyed Javadi, H. & Modirir, V. Key-management scheme for wireless sensor networks based on merging blocks of symmetric design. Wireless Netw 24, 2867–2879 (2018). https://doi.org/10.1007/s11276-017-1509-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1509-y

Keywords

Navigation