Skip to main content
Log in

Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

There is a set of applications in wireless sensor networks that forms a particular topology through specific placements of sensor nodes. This set is known as linear infrastructure or one dimensional network. Applications of such networks are subway tunnel or pipeline monitoring and perimeter surveillance. These applications often demand critical security concerns. Distribution of symmetric keys for such networks is different from those that are planner and are widely studied. By considering requirements for such linear infrastructure in detail, we observe that connectivity is an important issue as capturing a single node disrupts the entire network’s services. Therefore, we propose a new measure of connectivity that produces the optimal results with acutely lightweight key predistribution schemes (KPS). We also show the theoretical analysis of our proposed scheme and prove how it produces optimal results with lesser storage requirements as compared to other schemes. The performance analysis shows that the proposed KPS requires lesser number of keys per node (O(1) constant storage), as compared to the other existing schemes in the literature to provide the same level of connectivity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Romer, K., & Mattern, F. (2004). The design space of wireless sensor networks. IEEE Wireless Communications, 1(6), 54–61. doi:10.1109/mwc.2004.1368897.

    Article  Google Scholar 

  2. Martin, K. M., & Paterson, M. (2008). An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science, 192(2), 31–41. doi:10.1016/j.entcs.2008.05.004.

    Article  MATH  Google Scholar 

  3. Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report (pp. 05–07).

  4. Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11), 2314–2341. doi:10.1016/j.comcom.2007.04.009.

    Article  Google Scholar 

  5. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security, New York, NY, USA. doi:10.1145/586115.586117.

  6. Chen, C. Y., & Chao, H. C. (2014). A survey of key distribution in wireless sensor networks. Security and Communication Networks, 7(12), 2495–2508. doi:10.1002/sec.354.

    Article  Google Scholar 

  7. Martin, K. M., & Paterson, M. B. (2009). Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure. In Proceedings of the 3rd IFIP WG 11.2 international workshop on information security theory and practice. Smart Devices, pervasive systems, and ubiquitous networks (pp. 143–152). Berlin, Heidelberg: Springer. doi:10.1007/978-3-642-03944-7-11.

  8. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228–258. doi:10.1145/1065545.1065548.

    Article  Google Scholar 

  9. Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948–959. doi:10.1109/twc.2012.010413.120732.

    Article  Google Scholar 

  10. Hazra, P., Giri, D., & Das, A. K. (2015). Key chain-based key predistribution protocols for securing wireless sensor networks. In Springer mathematics and computing (pp. 135–154). doi:10.1007/978-81-322-2452-5_10.

  11. Sahingoz, O. K. (2013). Multi-level dynamic key management for scalable wireless sensor networks with uav. In Springer ubiquitous information technologies and applications (pp. 11–19). doi:10.1007/978-94-007-5857-5_2.

  12. Lévêque, O., & Preissmann, E. (2005) Scaling laws for one-dimensional adhoc wireless networks. IEEE transactions on information theory, 51(LTHI-ARTICLE-2006-011) (pp. 3987–3991). doi:10.1109/isit.2005.1523559.

  13. Liu, B., Thiran, P., & Towsley, D. (2007) Capacity of a wireless ad hoc network with infrastructure. In Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing, New York, NY, USA (pp. 239–246). doi:10.1145/1288107.1288140.

  14. Miorandi, D., & Altman, E. (2006). Connectivity in one-dimensional ad hoc networks: A queueing theoretical approach. Wireless Networks, 12(5), 573–587. doi:10.1007/s11276-006-6536-z.

    Article  Google Scholar 

  15. Zimmerling, M., Dargie, W., & Reason, J. M. (2008). Localized power-aware routing in linear wireless sensor networks. In Proceedings of the 2nd ACM international conference on context-awareness for self-managing systems, New York, NY, USA (pp. 24–33). doi:10.1145/1367943.1367946.

  16. Shah, K., & Jinwala, D. C. (2016). A secure expansive aggregation in wireless sensor networks for linear infrastructure. In IEEE Region 10 symposium (TENSYMP) (pp. 207–212). doi:10.1109/tenconspring.2016.7519406.

  17. Henry, K. J., & Stinson, D. R. (2014). Resilient aggregation in simple linear sensor networks. IACR cryptology ePrint Archive (pp. 288–310).

  18. Henry, K. J., & Stinson, D. R. (2015). Linear approaches to resilient aggregation in sensor networks. Journal of Mathematical Cryptology, 9(4), 245–272. doi:10.1515/jmc-2015-0042.

    Article  MathSciNet  MATH  Google Scholar 

  19. Jawhar, I., Mohamed, N., Shuaib, K., & Kesserwan, N. (2008). Monitoring linear infrastructures using wireless sensor networks. In Wireless sensor and actor networks II, IFIP the international federation for information processing vol. 264, (pp. 185–196). US: Springer. doi:10.1007/978-0-387-09441-0_16.

  20. Stoianov, I., Nachman, L., Madden, S., & Tokmouline, T. (2007). Pipeneta wireless sensor network for pipeline monitoring. In Proceedings of the 6th international conference on information processing in sensor networks, ACM, New York, NY, USA (pp. 264–273). doi:10.1145/1236360.1236396.

  21. Jawhar, I., Mohamed, N., & Shuaib, K. (2007). A framework for pipeline infrastructure monitoring using wireless sensor networks. In IEEE wireless telecommunications symposium (pp. 1–7). doi:10.1109/wts.2007.4563333.

  22. Mohamed, N., & Jawhar, I. (2008). A fault tolerant wired/wireless sensor network architecture for monitoring pipeline infrastructures. In Second IEEE international conference on sensor technologies and applications, SENSORCOMM’08 (pp. 179–184). doi:10.1109/sensorcomm.2008.116.

  23. Mohamed, N., Jawhar, I., & Shuaib, K. (2008). Reliability challenges and enhancement approaches for pipeline sensor and actor networks. In International conference on wireless networks (pp. 46–51).

  24. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501. doi:10.1007/s11276-014-0761-7.

    Article  Google Scholar 

  25. Paterson, M. B., & Stinson, D. R. (2014). A unified approach to combinatorial key predistribution schemes for sensor networks. Designs, Codes and Cryptography, 71(3), 433–457. doi:10.1007/s10623-012-9749-4.

    Article  MathSciNet  MATH  Google Scholar 

  26. Jan, M., Nanda, P., Usman, M., & He, X. (2016). Pawn: A payload-based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience. doi:10.1002/cpe.3986.

  27. Blackburn, S. R., Etzion, T., Martin, K. M., & Paterson, M. B. (2008). Efficient key predistribution for grid-based wireless sensor networks. In International conference on information theoretic security (pp. 54–69). Springer. doi:10.1007/978-3-540-85093-9_6.

  28. Golomb, S. W., & Taylor, H. (1984). Constructions and properties of costas arrays. Proceedings of the IEEE, 72(9), 1143–1163. doi:10.1109/PROC.1984.12994.

    Article  MATH  Google Scholar 

  29. Jawhar, I., Mohamed, N., Al-Jaroodi, J., & Zhang, S. (2014). A framework for using unmanned aerial vehicles for data collection in linear wireless sensor networks. Journal of Intelligent & Robotic Systems, 74(1–2), 437–453. doi:10.1007/s10846-013-9965-9.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaushal A. Shah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shah, K.A., Jinwala, D.C. Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure. Wireless Pers Commun 95, 3905–3921 (2017). https://doi.org/10.1007/s11277-017-4031-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4031-8

Keywords

Navigation