Skip to main content
Log in

A self-managing volatile key scheme for wireless sensor networks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The last decade has seen major advances in Wireless Sensor Networks (WSN). The limited amount of resources in WSNs is the main challenge for securing them. Indeed, sensors are inherently small devices with limited embedded storage, processor and battery capacity. The situation is even worse when attackers, with virtually unlimited amount of resources, have direct physical access to sensors. Cryptographic keys are used for authentication, authorization, confidentiality, data integrity, as well as many other security services. Several proposals have been made for key management in WSNs. In this paper, we review some notable key management schemes and propose a new one. The originality of our work lies in two main facts: first, we do not place a master key on all sensors before deploying them as several other proposals did, but we rather place the master key in a subset of sensors; second, the master keys are volatile, i.e., sensors use the master key to bootstrap the system and they delete them shortly after that. Our extensive simulations have shown the efficiency of our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Abomhara M, Zakaria O, Khalifa OO (2010) An overview of video encryption techniques. Int J Comput Theory Eng 2(1):103

    Google Scholar 

  • Al M, Yoshigoe K (2008) A Secure and Energy-Efficient Key Generation Mechanism for Wireless Sensor Networks. In: PDPTA, pp 587–593

  • Bechkit W, Challal Y, Bouabdallah A, Tarokh V (2013) A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans Wirel Commun 12(2):948–959

    Article  Google Scholar 

  • Bounceur A (2016) Cupcarbon: a new platform for designing and simulating smart-city and IOT wireless sensor networks (SCI-WSN). In: Proceedings of the international conference on internet of things and cloud computing. ACM. ​Cambridge, United Kingdom, p 1

  • Casola V, De Benedictis A, Drago A, Mazzocca N (2011) Analysis and comparison of security protocols in wireless sensor networks. In: Reliable distributed systems workshops (SRDSW), 2011 30th IEEE symposium. IEEE, ​Madrid, Spain, pp 52–56

  • Chen S, Liao X, Shu R, Shen X, Xu X, Zheng X (2011) High performance networking, computing, and communication systems: second international conference, ICHCC 2011, Singapore, 5–6 May 2011. Selected papers. Chapter dynamic key management scheme in wireless sensor networks, Springer, Berlin, pp 381–385

  • Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun Surv Tutorials 11(2):52–73

    Article  Google Scholar 

  • Cuzzocrea A, Fortino G, Rana O (2013) Managing data and processes in cloud-enabled large-scale sensor networks: state-of-the-art and future research directions. In: Cluster, cloud and grid computing (CCGrid), 2013 13th IEEE/ACM international symposium. IEEE, ​Delft, Netherlands, pp 583–588

  • Deng J, Hartung C, Han R, Mishra S (2005) A practical study of transitory master key establishment for wireless sensor networks. In: First international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05). ​Athens, Greece, pp 289–302

  • Diop A, Qi Y, Wang Q, Hussain S (2013) An advanced survey on secure energy-efficient hierarchical routing protocols in wireless sensor networks. arXiv preprint arXiv:1306.4595

  • Du W, Deng J, Han Y S, Varshney PK (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on computer and communications security, CCS ’03, ACM, New York, pp 42–51

  • Estébanez C, Saez Y, Recio G, Isasi P (2014) Performance of the most common non-cryptographic hash functions. Softw Pract Exp 44(6):681–698

    Article  Google Scholar 

  • Gandino F, Montrucchio B, Rebaudengo M (2009) Random key pre-distribution with transitory master key for wireless sensor networks. In: Proceedings of the 5th international student workshop on emerging networking experiments and technologies. ACM, Rome, Italy, pp 27–28

  • Gao Q, Ma W, Li X (2017) A key predistribution scheme based on mixed-level orthogonal arrays. Adhoc & Sens Wireless Netw 37(1–4):53–69

    Google Scholar 

  • Hammoudeh M (2016) Putting the lab on the map: a wireless sensor network system for border security and surveillance. In: Proceedings of the international conference on internet of things and cloud computing, ACM, ​Cambridge, United Kingdom, p 4

  • He X, Niedermeier M, De Meer H (2013) Dynamic key management in wireless sensor networks: a survey. J Netw Comput Appl 36(2):611–622

    Article  Google Scholar 

  • Huang Q, Cukier J, Kobayashi H, Liu B, Zhang J (2003) Fast authenticated key establishment protocols for self-organizing sensor networks. In: Proceedings of the 2nd ACM international conference on wireless sensor networks and applications. ACM, San Diego, CA, USA, pp 141–150

  • Jr MAS, Barreto PS, Carvalho CBMTC (2010) A survey on key management mechanisms for distributed wireless sensor networks. Comput Netw 54:2591–2612

    Article  MATH  Google Scholar 

  • Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Adhoc Netw 1(2):293–315

    Google Scholar 

  • Kavitha T, Sridharan D (2010) Security vulnerabilities in wireless sensor networks: a survey. J Inf Assur Secur 5(1):31–44

    Google Scholar 

  • Laouid A, Messai ML, Bounceur A., Euler R, Dahmani A, Tari A (2016) A dynamic and distributed key management scheme for wireless sensor networks. In: Proceedings of the international conference on internet of things and cloud computing. ACM. ​Cambridge, United Kingdom, p 70

  • Mehmood A, Umar MM, Song H (2017) ICMDS: secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Netw 55:97–106

    Article  Google Scholar 

  • Nack F (2010) An overview on wireless sensor networks. Institute of Computer Science (ICS), Freie Universität Berlin

  • Nadeem A, Javed MY (2005) A performance comparison of data encryption algorithms. In: Information and communication technologies, ICICT 2005. First international conference. IEEE, ​Karachi, Pakistan, pp 84–89

  • Padmavathi DG, Shanmugapriya M et al (2009) A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv:0909.0576

  • Plateau B, Atif K (1991) Stochastic automata network of modeling parallel systems. IEEE Trans Softw Eng 17(10):1093–1108

    Article  MathSciNet  Google Scholar 

  • Rahman M, Sampalli S (2012) A hybrid key management protocol for wireless sensor networks. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. ​Liverpool, UK, pp 769–776

  • Rahman M, Sampalli S, Hussain S (2010) A robust pair-wise and group key management protocol for wireless sensor network. In: 2010 IEEE Globecom workshops

  • Reegan AS, Baburaj E (2013) Key management schemes in wireless sensor networks: a survey. In: Circuits, power and computing technologies (ICCPCT), 2013 international conference. IEEE, ​Nagercoil, India, pp 813–820

  • Rogaway P (2004) Nonce-based symmetric encryption. In: Fast software encryption, Springer, Berlin, pp 348–358

  • Sahingoz OK (2013) Large scale wireless sensor networks with multi-level dynamic key management scheme. J Syst Archit 59(9):801–807

    Article  Google Scholar 

  • Sharaf M, Abughazala M, Muccini H, Abusair M (2017) An architecture framework for modelling and simulation of situational-aware cyber-physical systems. In: European conference on software architecture, Springer, Berlin, pp 95–111

  • Shi J, Wan J, Yan H, Suo H (2011) A survey of cyber-physical systems. In: Wireless communications and signal processing (WCSP), 2011 international conference. IEEE, pp 1–6

  • Simplício MA, Barreto PS, Margi CB, Carvalho TC (2010) A survey on key management mechanisms for distributed wireless sensor networks. Comput Netw 54(15):2591–2612

    Article  MATH  Google Scholar 

  • Tai WL, Chang YF, Li WH (2017) An IOT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. J Inf Secur Appl 34:133–141

    Google Scholar 

  • Ueno K, Suzumura T (2013) Parallel distributed breadth first search on GPU. In: High performance computing (HiPC), 2013 20th international conference. IEEE, ​Bangalore, India, pp 314–323

  • Uma M, Padmavathi G (2013) A survey on various cyber attacks and their classification. IJ Netw Secur 15(5):390–396

    Google Scholar 

  • Wang Y, Attebury G, Ramamurthy B (2006) A survey of security issues in wireless sensor networks. Comput Sci Eng

  • Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11):2314–2341

    Article  Google Scholar 

  • Yang Q, Zhu X, Fu H, Che X (2015) Survey of security technologies on wireless sensor networks. J Sens 2015:9

    Google Scholar 

  • Zhang J, Varadharajan V (2010) Wireless sensor network key management survey and taxonomy. J Netw Comput Appl 33(2):63–75

    Article  Google Scholar 

  • Zhang X, He J, Wei Q (2011) Eddk: energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP J Wirel Commun Netw 12:1–11

    Google Scholar 

Download references

Acknowledgements

We thank the anonymous referees for their constructive comments and suggestions, which helped to improve the quality of this paper. The first author acknowledges the support of the PNE program established by the government of Algeria.Thanks to CupCarbon, new proposals can be evaluated and compared with existing solutions in an accurate robust environment. CupCarbon (CupCarbonCupCarbon, A Smart City and IoT WSN Simulator http://www.cupcarbon.com) is an open source Java project and freely available for download.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelkader Laouid.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Laouid, A., Dahmani, A., Hassen, H.R. et al. A self-managing volatile key scheme for wireless sensor networks. J Ambient Intell Human Comput 10, 3349–3364 (2019). https://doi.org/10.1007/s12652-018-0772-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-0772-9

Keywords

Navigation