Abstract
The use of wireless sensor networks (WSNs) in any real-world application requires a certain level of security. To provide security of operations such as message exchange, key management schemes have to be well adapted to the particularities of WSNs. This paper proposes a novel key management scheme called SKM for sequence-based key management in WSNs. In SKM, sensor nodes are pre-distributed with the first term and the recursive formula of a numerical sequence. This two tiny pre-distributed information will ensure the establishment of pairwise keys to each sensor node with its neighbors after its deployment with a small amount of computation. The security analysis of SKM shows its efficiency. Simulation results confirm that SKM is lightweight in term of node’s resources and has a good resilience against node compromising attacks compared to the main existing schemes.
Similar content being viewed by others
References
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114
Alemdar A, Ibnkahla M (2007) Wireless sensor networks: applications and challenges. In: 9th international symposium on signal processing and its applications, pp 1–6. IEEE
Anderson R, Chan H, Perrig A (2004) Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE international conference on network protocols, pp 206–215. IEEE
Baojiang C, Ziyue W, Bing Z, Xiaobing L, Yuemin D (2015) Enhanced key management protocols for wireless sensor networks. Mob Inf Syst 2015:10. doi:10.1155/2015/627548
Bechkit W, Challal Y, Bouabdallah A, Tarokh V (2013) A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans Wirel Commun 12(2):948–959
Blom R (1985) An optimal class of symmetric key generation systems. In: Brickell EF (ed) CRYPTO. LNCS, vol 740. Springer, Heidelberg, pp 471–486
Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1993) Perfectly-secure key distribution for dynamic conferences. In: Brickell EF (ed) CRYPTO. LNCS, vol 740. Springer, Heidelberg, PP 471–486
Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010
Castelluccia C, Spognardi A (2007) Rok: a robust key pre-distribution protocol for multi-phase wireless sensor networks. In: Third international conference on security and privacy in communications networks and the workshops, 2007, pp 351–360. IEEE
Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the symposium on security and privacy 2003, pp 197–213. IEEE
Chen CL, Lin IH et al (2010) Location-aware dynamic session-key management for grid-based wireless sensor networks. Sensors 10(8):7347–7370
Cvrcek D, Svenda P (2006) Smart dust security-key infection revisited. Electr Notes Theor Comput Sci 157(3):11–25
Das AK (2012) A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int J Inf Secur 11(3):189–211
Dutertre B, Cheung S, Levy J (2004) Lightweight key management in wireless sensor networks by leveraging initial trust. Technical report SRI-SDL-04-02, SRI International
Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, pp 41–47. ACM (2002)
Jilna P, Pattathil DP (2015) A key management technique based on elliptic curves for static wireless sensor networks. Secur Commun Netw. doi:10.1002/sec.1295
Lai B, Kim S, Verbauwhede I (2002) Scalable session key construction protocol for wireless sensor networks. In: IEEE workshop on large scale real time and embedded systems (LARTES), p 7. IEEE
Liu D, Ning P (2003) Establishing pairwise keys in distributed sensor networks, 10th ACM ccs’03. Washington DC
Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inf Syst Secur (TISSEC) 8(1):41–77
Liu A, Kampanakis P, Ning P (2007) TinyECC: elliptic curve cryptography for sensor networks (version 0.3). http://discovery.csc.ncsu.edu/software/TinyECC/
Min X, Wei-Ren S, Chang-Jiang J, Ying Z (2010) Energy efficient clustering algorithm for maximizing lifetime of wireless sensor networks. AEU-Int J Electr Commun 64(4):289–298
Perrig A, Szewczyk R, Tygar J, Wen V, Culler DE (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521–534
Rahman M, Sampalli S (2015) An efficient pairwise and group key management protocol for wireless sensor network. Wirel Person Commun 84(3):2035–2053
Sarimurat S, Levi A (2013) Hag: hash graph based key predistribution scheme for multiphase wireless sensor networks. In: IEEE international conference on communications (ICC), pp 2079–2083. IEEE
Standard SH (1995) Fips publication 180–1. 17:1–24
Suganthi N, Vembu S (2014) Energy efficient key management scheme for wireless sensor networks. Int J Comput Commun Control 9(1):71–78
Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59–64. ACM
Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11):2314–2341
Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52(12):2292–2330
Yoneki E, Bacon J (2005) A survey of wireless sensor network technologies: research trends and middleware’s role. University of Cambridge TR 646, Cambridge
Zhang J, Varadharajan V (2010) Wireless sensor network key management survey and taxonomy. J Netw Comput Appl 33(2):63–75
Zhu S, Setia S, Jajodia S (2003) Leap: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM conference on computer and communications security. ACM
Zhu S, Setia S, Jajodia S (2006) Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sens Netw (TOSN) 2(4):500–528
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Messai, ML., Seba, H. & Aliouat, M. A lightweight key management scheme for wireless sensor networks. J Supercomput 71, 4400–4422 (2015). https://doi.org/10.1007/s11227-015-1534-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-015-1534-5