Skip to main content
Log in

LKH++ Based Group Key Management Scheme for Wireless Sensor Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper proposes a secure low-power group key management scheme based on LKH++. In our scheme, we construct a secure tree to manage group keys. The building method of key tree and holding way of keys are proposed by our scheme to reduce computation and storage overhead on each sensor node. In addition, WLKH supports rekeying to enhance network security and survivability against node capture. Performance analysis shows WLKH is highly efficient in term of security, computation and key storage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 15(2), 551–591.

    Article  Google Scholar 

  2. Sha, K., Gehlot, J., & Greve, R. (2013). Multipath routing techniques in wireless sensor networks: A survey. Wireless Personal Communications, 70(2), 807–829.

    Article  Google Scholar 

  3. Liu, Y., Zhang, Q., & Ni, L. M. (2010). Opportunity-based topology control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 21(3), 405–416.

    Article  Google Scholar 

  4. Aslam, N., Robertson, W., & Phillips, W. (2009). Algorithms for relay node selection in randomly deployed homogeneous cluster-based wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 8(1), 5–20.

    Google Scholar 

  5. Ding, G., Wang, J., & Wu, Q. (2013). Spectrum sensing in opportunity-heterogeneous cognitive sensor networks: How to cooperate. IEEE Sensors Journal, 13(11), 4247–4255.

    Article  Google Scholar 

  6. Viani, F., Robol, F., & Polo, A. (2013). Wireless architectures for heterogeneous sensing in smart home applications: Concepts and real implementation. Proceedings of IEEE, 101(11), 1–16.

    Article  Google Scholar 

  7. Zois, D. S., Levorato, M., & Mitra, U. (2013). Energy-efficient, heterogeneous sensor selection for physical activity detection in wireless body area networks. IEEE Transactions on Signal Processing, 61(5–8), 1581–1594.

    Article  MathSciNet  Google Scholar 

  8. Alonso, R. S., Tapia, D. I., & Bajo, J. (2013). Implementing a hardware-embedded reactive agents platform based on a service-oriented architecture over heterogeneous wireless sensor networks. Ad Hoc Networks, 11(1), 151–166.

    Article  Google Scholar 

  9. Khedr, A. M., & Osamy, W. (2011). Minimum perimeter coverage of query regions in a heterogeneous wireless sensor network. Information Sciences, 181(15), 3130–3142.

    Article  Google Scholar 

  10. Yoo, S. J., Lee, D. H., & Yang, H. S. (2013). A novel secure scheme for wireless Ad Hoc network. Wireless Personal Communications, 73(2), 197–205.

    Article  Google Scholar 

  11. Chen, C. M., Zheng, X., & Wu, T. Y. (2014). A complete hierarchical key management scheme for heterogeneous wireless sensor networks. The Scientific World Journal, 2014.

  12. Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks, In IWCMC ’07 Proceedings of the 2007 international conference on wireless communications and mobile computing, 388–392.

  13. Brown, J., Du, X., & Nygrad, K. (2007). An efficient public-key-based heterogeneous sensor network key distribution scheme. Ad Hoc Networks, 5(1), 24–34.

    Article  Google Scholar 

  14. Traynor, P., Kumar, R., & Choi, H. (2007). Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing, 6(6), 663–677.

    Article  Google Scholar 

  15. Zhang, W., Zhu, S., & Cao, G. (2009). Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks, 7(6), 1229–1242.

    Article  Google Scholar 

  16. Banihashemian, S., Bafghi, A. G., & Moghaddam, M. H. Y. (2011). Centralized key management scheme in wireless sensor networks. Wireless Personal Communications, 60(3), 463–474.

    Article  Google Scholar 

  17. Zhang, X., He, J., & Wei, Q. (2011). EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011, 12.

    Article  Google Scholar 

  18. Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2013) A low-energy key management protocol for wireless sensor networks, Eighth IEEE symposium on computers and communications, 335–340(2013).

  19. Ya-nan, L., Jian, W., & He, D. (2008). Intra-cluster key sharing in hierarchical sensor networks. IET Wireless Sensor Systems, 3(3), 172–182.

    Article  Google Scholar 

  20. Shamir, A. (1979). How to share a secret . Communications of the ACM, 22(11), 612–613.

    Article  MathSciNet  Google Scholar 

  21. Seo, S. H., Won, J., & Sultana, S. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.

    Article  Google Scholar 

  22. Di Pietro, R., Mancini, L. V., & Jajodia, S. (2002). Efficient and secure keys management for wireless mobile communications. In Proceedings of the second ACM international workshop on principles of mobile computing. 2002, 66–73.

  23. Karaboga, D., Okdem, S., & Ozturk, C. (2012). Cluster based wireless sensor network routing using artilcial bee colony algorithm. Wireless Networks, 18(7), 847–860.

    Article  Google Scholar 

  24. Kellokoski, J., & Koskinen, J. (2014). Always best connected heterogeneous network concept. Wireless Personal Communications, 75(1), 63–80.

    Article  Google Scholar 

Download references

Acknowledgments

This study is supported by the National Natural Science Foundation of China (61370069), the National High Technology Research and Development Program (“863”Program) of China (2012AA012606) and the Fundamental Research Funds for the Central Universities (BUPT2011RCZJ16) and China Information Security Special Fund (NDRC).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Si Han.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yao, W., Han, S. & Li, X. LKH++ Based Group Key Management Scheme for Wireless Sensor Network. Wireless Pers Commun 83, 3057–3073 (2015). https://doi.org/10.1007/s11277-015-2582-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2582-0

Keywords

Navigation