Skip to main content
Log in

A lightweight key management scheme for wireless sensor networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The use of wireless sensor networks (WSNs) in any real-world application requires a certain level of security. To provide security of operations such as message exchange, key management schemes have to be well adapted to the particularities of WSNs. This paper proposes a novel key management scheme called SKM for sequence-based key management in WSNs. In SKM, sensor nodes are pre-distributed with the first term and the recursive formula of a numerical sequence. This two tiny pre-distributed information will ensure the establishment of pairwise keys to each sensor node with its neighbors after its deployment with a small amount of computation. The security analysis of SKM shows its efficiency. Simulation results confirm that SKM is lightweight in term of node’s resources and has a good resilience against node compromising attacks compared to the main existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. http://www.mathworks.com/products/matlab/.

References

  1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114

    Article  Google Scholar 

  2. Alemdar A, Ibnkahla M (2007) Wireless sensor networks: applications and challenges. In: 9th international symposium on signal processing and its applications, pp 1–6. IEEE

  3. Anderson R, Chan H, Perrig A (2004) Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE international conference on network protocols, pp 206–215. IEEE

  4. Baojiang C, Ziyue W, Bing Z, Xiaobing L, Yuemin D (2015) Enhanced key management protocols for wireless sensor networks. Mob Inf Syst 2015:10. doi:10.1155/2015/627548

  5. Bechkit W, Challal Y, Bouabdallah A, Tarokh V (2013) A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans Wirel Commun 12(2):948–959

    Article  Google Scholar 

  6. Blom R (1985) An optimal class of symmetric key generation systems. In: Brickell EF (ed) CRYPTO. LNCS, vol 740. Springer, Heidelberg, pp 471–486

  7. Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1993) Perfectly-secure key distribution for dynamic conferences. In: Brickell EF (ed) CRYPTO. LNCS, vol 740. Springer, Heidelberg, PP 471–486

  8. Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010

  9. Castelluccia C, Spognardi A (2007) Rok: a robust key pre-distribution protocol for multi-phase wireless sensor networks. In: Third international conference on security and privacy in communications networks and the workshops, 2007, pp 351–360. IEEE

  10. Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the symposium on security and privacy 2003, pp 197–213. IEEE

  11. Chen CL, Lin IH et al (2010) Location-aware dynamic session-key management for grid-based wireless sensor networks. Sensors 10(8):7347–7370

    Article  Google Scholar 

  12. Cvrcek D, Svenda P (2006) Smart dust security-key infection revisited. Electr Notes Theor Comput Sci 157(3):11–25

    Article  Google Scholar 

  13. Das AK (2012) A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int J Inf Secur 11(3):189–211

    Article  Google Scholar 

  14. Dutertre B, Cheung S, Levy J (2004) Lightweight key management in wireless sensor networks by leveraging initial trust. Technical report SRI-SDL-04-02, SRI International

  15. Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, pp 41–47. ACM (2002)

  16. Jilna P, Pattathil DP (2015) A key management technique based on elliptic curves for static wireless sensor networks. Secur Commun Netw. doi:10.1002/sec.1295

  17. Lai B, Kim S, Verbauwhede I (2002) Scalable session key construction protocol for wireless sensor networks. In: IEEE workshop on large scale real time and embedded systems (LARTES), p 7. IEEE

  18. Liu D, Ning P (2003) Establishing pairwise keys in distributed sensor networks, 10th ACM ccs’03. Washington DC

  19. Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inf Syst Secur (TISSEC) 8(1):41–77

    Article  Google Scholar 

  20. Liu A, Kampanakis P, Ning P (2007) TinyECC: elliptic curve cryptography for sensor networks (version 0.3). http://discovery.csc.ncsu.edu/software/TinyECC/

  21. Min X, Wei-Ren S, Chang-Jiang J, Ying Z (2010) Energy efficient clustering algorithm for maximizing lifetime of wireless sensor networks. AEU-Int J Electr Commun 64(4):289–298

    Article  Google Scholar 

  22. Perrig A, Szewczyk R, Tygar J, Wen V, Culler DE (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521–534

    Article  MATH  Google Scholar 

  23. Rahman M, Sampalli S (2015) An efficient pairwise and group key management protocol for wireless sensor network. Wirel Person Commun 84(3):2035–2053

  24. Sarimurat S, Levi A (2013) Hag: hash graph based key predistribution scheme for multiphase wireless sensor networks. In: IEEE international conference on communications (ICC), pp 2079–2083. IEEE

  25. Standard SH (1995) Fips publication 180–1. 17:1–24

  26. Suganthi N, Vembu S (2014) Energy efficient key management scheme for wireless sensor networks. Int J Comput Commun Control 9(1):71–78

    Article  Google Scholar 

  27. Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59–64. ACM

  28. Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11):2314–2341

    Article  Google Scholar 

  29. Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52(12):2292–2330

    Article  Google Scholar 

  30. Yoneki E, Bacon J (2005) A survey of wireless sensor network technologies: research trends and middleware’s role. University of Cambridge TR 646, Cambridge

  31. Zhang J, Varadharajan V (2010) Wireless sensor network key management survey and taxonomy. J Netw Comput Appl 33(2):63–75

    Article  Google Scholar 

  32. Zhu S, Setia S, Jajodia S (2003) Leap: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM conference on computer and communications security. ACM

  33. Zhu S, Setia S, Jajodia S (2006) Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sens Netw (TOSN) 2(4):500–528

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamida Seba.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Messai, ML., Seba, H. & Aliouat, M. A lightweight key management scheme for wireless sensor networks. J Supercomput 71, 4400–4422 (2015). https://doi.org/10.1007/s11227-015-1534-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1534-5

Keywords

Navigation