Abstract
This paper proposes a secure low-power group key management scheme based on LKH++. In our scheme, we construct a secure tree to manage group keys. The building method of key tree and holding way of keys are proposed by our scheme to reduce computation and storage overhead on each sensor node. In addition, WLKH supports rekeying to enhance network security and survivability against node capture. Performance analysis shows WLKH is highly efficient in term of security, computation and key storage.









Similar content being viewed by others
References
Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.
Sha, K., Gehlot, J., & Greve, R. (2013). Multipath routing techniques in wireless sensor networks: A survey. Wireless Personal Communications, 70(2), 807–829.
Liu, Y., Zhang, Q., & Ni, L. M. (2010). Opportunity-based topology control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 21(3), 405–416.
Aslam, N., Robertson, W., & Phillips, W. (2009). Algorithms for relay node selection in randomly deployed homogeneous cluster-based wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 8(1), 5–20.
Ding, G., Wang, J., & Wu, Q. (2013). Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate. IEEE Sensors Journal, 13(11), 4247–4255.
Viani, F., Robol, F., & Polo, A. (2013). Wireless architectures for heterogeneous sensing in smart home applications: Concepts and real implementation. Proceedings of IEEE, 101(11), 1–16.
Zois, D. S., Levorato, M., & Mitra, U. (2013). Energy-efficient, heterogeneous sensor selection for physical activity detection in wireless body area networks. IEEE Transactions on Signal Processing, 61(5–8), 1581–1594.
Alonso, R. S., Tapia, D. I., & Bajo, J. (2013). Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks, 11(1), 151–166.
Khedr, A. M., & Osamy, W. (2011). Minimum perimeter coverage of query regions in a heterogeneous wireless sensor network. Information Sciences, 181(15), 3130–3142.
Yoo, S. J., Lee, D. H., & Yang, H. S. (2013). A novel secure scheme for wireless Ad Hoc network. Wireless Personal Communications, 73(2), 197–205.
Chen, C. M., Zheng, X., & Wu, T. Y. (2014). A complete hierarchical key management scheme for heterogeneous wireless sensor networks. The Scientific World Journal, 2014.
Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks, In IWCMC ’07 Proceedings of the 2007 international conference on wireless communications and mobile computing, 388–392.
Brown, J., Du, X., & Nygrad, K. (2007). An efficient public-key-based heterogeneous sensor network key distribution scheme. Ad Hoc Networks, 5(1), 24–34.
Traynor, P., Kumar, R., & Choi, H. (2007). Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing, 6(6), 663–677.
Zhang, W., Zhu, S., & Cao, G. (2009). Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks, 7(6), 1229–1242.
Banihashemian, S., Bafghi, A. G., & Moghaddam, M. H. Y. (2011). Centralized key management scheme in wireless sensor networks. Wireless Personal Communications, 60(3), 463–474.
Zhang, X., He, J., & Wei, Q. (2011). EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011, 12.
Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2013) A low-energy key management protocol for wireless sensor networks, Eighth IEEE symposium on computers and communications, 335–340(2013).
Ya-nan, L., Jian, W., & He, D. (2008). Intra-cluster key sharing in hierarchical sensor networks. IET Wireless Sensor Systems, 3(3), 172–182.
Shamir, A. (1979). How to share a secret . Communications of the ACM, 22(11), 612–613.
Seo, S. H., Won, J., & Sultana, S. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.
Di Pietro, R., Mancini, L. V., & Jajodia, S. (2002). Efficient and secure keys management for wireless mobile communications. In Proceedings of the second ACM international workshop on principles of mobile computing. 2002, 66–73.
Karaboga, D., Okdem, S., & Ozturk, C. (2012). Cluster based wireless sensor network routing using artilcial bee colony algorithm. Wireless Networks, 18(7), 847–860.
Kellokoski, J., & Koskinen, J. (2014). Always best connected heterogeneous network concept. Wireless Personal Communications, 75(1), 63–80.
Acknowledgments
This study is supported by the National Natural Science Foundation of China (61370069), the National High Technology Research and Development Program (“863”Program) of China (2012AA012606) and the Fundamental Research Funds for the Central Universities (BUPT2011RCZJ16) and China Information Security Special Fund (NDRC).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yao, W., Han, S. & Li, X. LKH++ Based Group Key Management Scheme for Wireless Sensor Network. Wireless Pers Commun 83, 3057–3073 (2015). https://doi.org/10.1007/s11277-015-2582-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2582-0