Skip to main content
Log in

A new hybrid key pre-distribution scheme for wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

This article presents a novel hybrid key pre-distribution scheme based on combinatorial design keys and pair-wise keys. For the presented scheme, the deployment zone is cleft into equal-sized cells. We use the combinatorial design based keys to secure intra-cell communication, which helps to maintain low key storage overhead in the network. For inter-cell communication, each cell maintain multiple associations with all the other cells within communication range and these associations are secured with pair-wise keys. This helps to ensure high resiliency against compromised sensor nodes in the network. We provide in-depth analysis for the presented scheme. We measure the resiliency of the presented scheme by calculating fraction of links effected and fraction of nodes disconnected when adversary compromises some sensor nodes in the network. We find that the presented scheme has high resiliency than majority of existing schemes. Our presented scheme also has low storage overhead than existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.

    Article  Google Scholar 

  2. Kumar, A., & Pais, A. R. (2017). En-route filtering techniques in wireless sensor networks: A survey. Wireless Personal Communications, 96(1), 697–739.

    Article  Google Scholar 

  3. Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.

    Article  Google Scholar 

  4. Liu, D., & Ning, P. (2005). Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(2), 204–239.

    Article  Google Scholar 

  5. Ruj, S., & Roy, B. (2009). Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(1), 4.

    Article  Google Scholar 

  6. Bag, S. (2015). A new key predistribution scheme for grid-group deployment of wireless sensor networks. Adhoc & Sensor Wireless Networks, 27, 313–329.

    Google Scholar 

  7. Bag, S., & Roy, B. (2013). A new key predistribution scheme for general and grid-group deployment of wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2013(1), 145.

    Article  Google Scholar 

  8. Mitra, S., Mukhopadhyay, S., & Dutta, R. (2012). A flexible deterministic approach to key pre-distribution in grid based wsns. In International conference on ad hoc networks (pp. 164–179). Berlin: Springer

  9. Simonova, K., Ling, A. C., & Wang, X. S. (2006). Location-aware key predistribution scheme for wide area wireless sensor networks. In Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks (pp. 157–168). ACM.

  10. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992) Perfectly-secure key distribution for dynamic conferences. In Annual international cryptology conference (pp. 471–486). Berlin: Springer.

  11. Blom, R. (1984). An optimal class of symmetric key generation systems. In Workshop on the theory and application of of cryptographic techniques (pp. 335–338). Berlin: Springer.

  12. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228–258.

    Article  Google Scholar 

  13. Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2006). A key predistribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable and Secure Computing, 3(1), 62–77.

    Article  Google Scholar 

  14. Huang, D., & Medhi, D. (2007). Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ACM Transactions on Sensor Networks (TOSN), 3(3), 16.

    Article  Google Scholar 

  15. Huang, D., Mehta, M., Medhi, D., & Harn, L. (2004). Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (pp. 29–42). ACM.

  16. Anderson, I. (1990). Combinatorial designs: Construction methods. Amsterdam: Ellis Horwood.

    MATH  Google Scholar 

  17. Stinson, D. R. (2007). Combinatorial designs: Constructions and analysis. Berlin: Springer.

    MATH  Google Scholar 

  18. Blackburn, S. R., Etzion, T., Martin, K. M., & Paterson, M. B. (2008). Efficient key predistribution for grid-based wireless sensor networks. In International conference on information theoretic security (pp. 54–69). Berlin: Springer.

  19. Black, P. E. (2006). Manhattan distance. Dictionary of Algorithms and Data Structures, 18, 2012.

    Google Scholar 

  20. Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422–426.

    Article  MATH  Google Scholar 

  21. Çamtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), 346–358.

    Article  Google Scholar 

  22. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 41–47). ACM.

  23. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In 2003 Symposium on security and privacy, 2003 Proceedings (pp. 197–213). IEEE.

  24. Datasheet, M. (2006). Crossbow technology inc (p. 50). San Jose, CA.

  25. Kim, J. M., Lee, H. S., Yi, J., & Park, M. (2016). Power adaptive data encryption for energy-efficient and secure communication in solar-powered wireless sensor networks. Journal of Sensors. https://doi.org/10.1155/2016/2678269.

    Google Scholar 

  26. Galindo, D., Roman, R., & Lopez, J. (2012). On the energy cost of authenticated key agreement in wireless sensor networks. Wireless Communications and Mobile Computing, 12(1), 133–143.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alok Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, A., Pais, A.R. A new hybrid key pre-distribution scheme for wireless sensor networks. Wireless Netw 25, 1185–1199 (2019). https://doi.org/10.1007/s11276-018-1698-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-018-1698-z

Keywords

Navigation