Skip to main content
Log in

A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security is a critical issue when sensor nodes are deployed in a hostile environment. This paper proposes a novel Polynomial based Q composite random scheme for the establishment of triple key among communicating nodes in a network. The proposed scheme combines the robustness of Q-Composite Key Generation Scheme with the Polynomial Pool-Based Schemethat enables a secure communication between wireless sensor nodes. The security analysis shows that our scheme assures a high probability of secure communication with a low communication overhead. The simulation results prove that our scheme performs better in terms of network resilience against node capture attacks with a high probability of connectivity. The proposed scheme shows an improvement in compromised data links between non compromised sensors.Our scheme also provides high resilience in terms of the fraction of unaffected communication links against the compromised nodes even in the presence of a large number of malicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Huang, D., & Medhi, D. (2007). Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ACM Transactions on Sensor Networks, 3(3), 16:1–16:34.

  2. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in Ad Hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE international conference network protocols, (pp. 326–335). IEEE Computer Society.

  3. He, X., Niedermeier, M., & de Meer, H. (2013). Dynamic key management in wireless sensor networks: A survey. Journal of Network and Computer Applications, 36(2), 611–622.

    Article  Google Scholar 

  4. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions Information and System Security, 8(2), 228–258.

    Article  Google Scholar 

  5. Traynor, P., Choi, H., Cao, G., Zhu, S., & Porta, T. L. (2006). Establishing pair-wise keys in heterogeneous sensor networks. In Proceedings of the 25th IEEE international conference on computer communications, (pp. 1–12). Spain.

  6. Blom, R. (1984). An optimal class of symmetric key generation systems. In Proceeding workshop advances in cryptology: Theory and application of cryptographic techniques. EUROCRYPT’84, (pp. 335–338). New York: Springer.

  7. Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In Lecture notes in computer science, (Vol. 740, pp. 471–486). Heidelberg: Springer.

  8. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security, (pp. 41–47). New York.

  9. Chan, H., Perrig, A., & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceeding IEEE symposium security and privacy. Pittsburgh: Research showcase, Carnegie Mellon University.

  10. Rasheed, A., & Mahapatra, R. N. (2011). Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 176–184.

  11. Liu, D., Ning, P., & Li, R. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM conference on computer and communications security, (pp. 52–61). New York.

  12. Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.

    Article  MathSciNet  Google Scholar 

  13. Lu, K., Qian, Y., Guizani, M., & Chen, H.-H. (2008). A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Transactions on Wireless Communications, 7(2), 639–647.

  14. Chan, H., & Perrig, A. (2005). PIKE: Peer intermediaries for key establishment in sensor networks. In Proceeding IEEE INFO COM, (pp. 524–535). Miami.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. A. Mary Anita.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anita, E.A.M., Geetha, R. & Kannan, E. A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks. Wireless Pers Commun 82, 1419–1433 (2015). https://doi.org/10.1007/s11277-015-2290-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2290-9

Keywords

Navigation