Abstract
The last decade has seen major advances in Wireless Sensor Networks (WSN). The limited amount of resources in WSNs is the main challenge for securing them. Indeed, sensors are inherently small devices with limited embedded storage, processor and battery capacity. The situation is even worse when attackers, with virtually unlimited amount of resources, have direct physical access to sensors. Cryptographic keys are used for authentication, authorization, confidentiality, data integrity, as well as many other security services. Several proposals have been made for key management in WSNs. In this paper, we review some notable key management schemes and propose a new one. The originality of our work lies in two main facts: first, we do not place a master key on all sensors before deploying them as several other proposals did, but we rather place the master key in a subset of sensors; second, the master keys are volatile, i.e., sensors use the master key to bootstrap the system and they delete them shortly after that. Our extensive simulations have shown the efficiency of our approach.








Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abomhara M, Zakaria O, Khalifa OO (2010) An overview of video encryption techniques. Int J Comput Theory Eng 2(1):103
Al M, Yoshigoe K (2008) A Secure and Energy-Efficient Key Generation Mechanism for Wireless Sensor Networks. In: PDPTA, pp 587–593
Bechkit W, Challal Y, Bouabdallah A, Tarokh V (2013) A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans Wirel Commun 12(2):948–959
Bounceur A (2016) Cupcarbon: a new platform for designing and simulating smart-city and IOT wireless sensor networks (SCI-WSN). In: Proceedings of the international conference on internet of things and cloud computing. ACM. Cambridge, United Kingdom, p 1
Casola V, De Benedictis A, Drago A, Mazzocca N (2011) Analysis and comparison of security protocols in wireless sensor networks. In: Reliable distributed systems workshops (SRDSW), 2011 30th IEEE symposium. IEEE, Madrid, Spain, pp 52–56
Chen S, Liao X, Shu R, Shen X, Xu X, Zheng X (2011) High performance networking, computing, and communication systems: second international conference, ICHCC 2011, Singapore, 5–6 May 2011. Selected papers. Chapter dynamic key management scheme in wireless sensor networks, Springer, Berlin, pp 381–385
Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun Surv Tutorials 11(2):52–73
Cuzzocrea A, Fortino G, Rana O (2013) Managing data and processes in cloud-enabled large-scale sensor networks: state-of-the-art and future research directions. In: Cluster, cloud and grid computing (CCGrid), 2013 13th IEEE/ACM international symposium. IEEE, Delft, Netherlands, pp 583–588
Deng J, Hartung C, Han R, Mishra S (2005) A practical study of transitory master key establishment for wireless sensor networks. In: First international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05). Athens, Greece, pp 289–302
Diop A, Qi Y, Wang Q, Hussain S (2013) An advanced survey on secure energy-efficient hierarchical routing protocols in wireless sensor networks. arXiv preprint arXiv:1306.4595
Du W, Deng J, Han Y S, Varshney PK (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on computer and communications security, CCS ’03, ACM, New York, pp 42–51
Estébanez C, Saez Y, Recio G, Isasi P (2014) Performance of the most common non-cryptographic hash functions. Softw Pract Exp 44(6):681–698
Gandino F, Montrucchio B, Rebaudengo M (2009) Random key pre-distribution with transitory master key for wireless sensor networks. In: Proceedings of the 5th international student workshop on emerging networking experiments and technologies. ACM, Rome, Italy, pp 27–28
Gao Q, Ma W, Li X (2017) A key predistribution scheme based on mixed-level orthogonal arrays. Adhoc & Sens Wireless Netw 37(1–4):53–69
Hammoudeh M (2016) Putting the lab on the map: a wireless sensor network system for border security and surveillance. In: Proceedings of the international conference on internet of things and cloud computing, ACM, Cambridge, United Kingdom, p 4
He X, Niedermeier M, De Meer H (2013) Dynamic key management in wireless sensor networks: a survey. J Netw Comput Appl 36(2):611–622
Huang Q, Cukier J, Kobayashi H, Liu B, Zhang J (2003) Fast authenticated key establishment protocols for self-organizing sensor networks. In: Proceedings of the 2nd ACM international conference on wireless sensor networks and applications. ACM, San Diego, CA, USA, pp 141–150
Jr MAS, Barreto PS, Carvalho CBMTC (2010) A survey on key management mechanisms for distributed wireless sensor networks. Comput Netw 54:2591–2612
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Adhoc Netw 1(2):293–315
Kavitha T, Sridharan D (2010) Security vulnerabilities in wireless sensor networks: a survey. J Inf Assur Secur 5(1):31–44
Laouid A, Messai ML, Bounceur A., Euler R, Dahmani A, Tari A (2016) A dynamic and distributed key management scheme for wireless sensor networks. In: Proceedings of the international conference on internet of things and cloud computing. ACM. Cambridge, United Kingdom, p 70
Mehmood A, Umar MM, Song H (2017) ICMDS: secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Netw 55:97–106
Nack F (2010) An overview on wireless sensor networks. Institute of Computer Science (ICS), Freie Universität Berlin
Nadeem A, Javed MY (2005) A performance comparison of data encryption algorithms. In: Information and communication technologies, ICICT 2005. First international conference. IEEE, Karachi, Pakistan, pp 84–89
Padmavathi DG, Shanmugapriya M et al (2009) A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv:0909.0576
Plateau B, Atif K (1991) Stochastic automata network of modeling parallel systems. IEEE Trans Softw Eng 17(10):1093–1108
Rahman M, Sampalli S (2012) A hybrid key management protocol for wireless sensor networks. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. Liverpool, UK, pp 769–776
Rahman M, Sampalli S, Hussain S (2010) A robust pair-wise and group key management protocol for wireless sensor network. In: 2010 IEEE Globecom workshops
Reegan AS, Baburaj E (2013) Key management schemes in wireless sensor networks: a survey. In: Circuits, power and computing technologies (ICCPCT), 2013 international conference. IEEE, Nagercoil, India, pp 813–820
Rogaway P (2004) Nonce-based symmetric encryption. In: Fast software encryption, Springer, Berlin, pp 348–358
Sahingoz OK (2013) Large scale wireless sensor networks with multi-level dynamic key management scheme. J Syst Archit 59(9):801–807
Sharaf M, Abughazala M, Muccini H, Abusair M (2017) An architecture framework for modelling and simulation of situational-aware cyber-physical systems. In: European conference on software architecture, Springer, Berlin, pp 95–111
Shi J, Wan J, Yan H, Suo H (2011) A survey of cyber-physical systems. In: Wireless communications and signal processing (WCSP), 2011 international conference. IEEE, pp 1–6
Simplício MA, Barreto PS, Margi CB, Carvalho TC (2010) A survey on key management mechanisms for distributed wireless sensor networks. Comput Netw 54(15):2591–2612
Tai WL, Chang YF, Li WH (2017) An IOT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. J Inf Secur Appl 34:133–141
Ueno K, Suzumura T (2013) Parallel distributed breadth first search on GPU. In: High performance computing (HiPC), 2013 20th international conference. IEEE, Bangalore, India, pp 314–323
Uma M, Padmavathi G (2013) A survey on various cyber attacks and their classification. IJ Netw Secur 15(5):390–396
Wang Y, Attebury G, Ramamurthy B (2006) A survey of security issues in wireless sensor networks. Comput Sci Eng
Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11):2314–2341
Yang Q, Zhu X, Fu H, Che X (2015) Survey of security technologies on wireless sensor networks. J Sens 2015:9
Zhang J, Varadharajan V (2010) Wireless sensor network key management survey and taxonomy. J Netw Comput Appl 33(2):63–75
Zhang X, He J, Wei Q (2011) Eddk: energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP J Wirel Commun Netw 12:1–11
Acknowledgements
We thank the anonymous referees for their constructive comments and suggestions, which helped to improve the quality of this paper. The first author acknowledges the support of the PNE program established by the government of Algeria.Thanks to CupCarbon, new proposals can be evaluated and compared with existing solutions in an accurate robust environment. CupCarbon (CupCarbonCupCarbon, A Smart City and IoT WSN Simulator http://www.cupcarbon.com) is an open source Java project and freely available for download.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Laouid, A., Dahmani, A., Hassen, H.R. et al. A self-managing volatile key scheme for wireless sensor networks. J Ambient Intell Human Comput 10, 3349–3364 (2019). https://doi.org/10.1007/s12652-018-0772-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0772-9