Skip to main content

Advertisement

Log in

Energy Efficient Key Distribution and Management Scheme in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With vast areas of application ranging from household automation systems through industrial plant monitoring systems to military surveillance systems, security has become a major concern especially in aggressive environments like battle fields. The sensor nodes along with the data, while in transit, must be protected from malicious attackers. Though using public key cryptographic schemes like RSA and elliptic curve cryptography would provide sufficient security. Their use has been limited owing to their computationally intensive operations which conflict with the resource limitations in wireless sensor nodes. Key pre-distribution has proved to be the most feasible amongst key management schemes in wireless sensor networks (WSNs). Research in key management continues to take center stage due to its importance amongst security primitives in WSNs. An improved energy efficient key distribution and management scheme is proposed in this paper. Results and simulations show that the proposed scheme conserves energy and performs better than other existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11, 52–73. doi:10.1109/surv.2009.090205.

    Article  Google Scholar 

  2. Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and communications security-CCS ‘02, (pp. 41–47). doi:10.1145/586110.586117.

  3. Pandey, M., & Verma, S. (2013). Privacy provisioning in wireless sensor networks. Wireless Personal Communications, 75, 1115–1140. doi:10.1007/s11277-013-1411-6.

    Article  Google Scholar 

  4. ETSI. (2014). Quantum safe cryptography and security; an introduction, benefits, enablers and challenges. https://portal.etsi.org/Portals/0/TBpages/QSC/Docs/Quantum_Safe_Whitepaper_1_0_0.pdf. Accessed 15 Nov 2015.

  5. Chan, H., & Perrig, A. (2003). Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11–14 May 2003, (pp. 197–213). Berkeley: California.

  6. Jolly, G., Kuscu, M., Kokate, P., & Younis, M. (2003). A low-energy key management protocol for wireless sensor networks. In Proceedings of the Eighth IEEE Symposium on Computers and Communications ISCC (Vol. 1, pp. 335–340). doi:10.1109/iscc.2003.1214142.

  7. Blom, R. (1985). Proceedings of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques (pp. 335–338).

  8. Du, W., Deng, J., Han, Y., & Varshney, P. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communication Security-CCS ‘03 (pp. 42–51). doi:10.1145/948109.948118.

  9. Chan, H., & Perrig, A. (2005). PIKE—Peer intermediaries for key establishment in sensor networks. In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (Vol. 1, pp. 524–535). doi:10.1109/infcom.2005.1497920.

  10. Cheng, Y., & Agrawal, D. (2005). Efficient pairwise key establishment and management in static wireless sensor networks. In IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (Vol. 7, pp. 544–550). doi:10.1109/mahss.2005.1542842.

  11. Cheng, Y., & Agrawal, D. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks, 5, 35–48. doi:10.1016/j.adhoc.2006.05.011.

    Article  Google Scholar 

  12. Harn, L., & Hsu, C. (2015). Predistribution scheme for establishing group keys in wireless sensor networks. IEEE Sensors Journal, 15, 5103–5108. doi:10.1109/jsen.2015.2429582.

    Article  Google Scholar 

  13. López, C. P. (2014). MATLAB programming for numerical analysis (pp. 200–203). Madrid: Apress.

    Google Scholar 

  14. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1998). Perfectly secure key distribution for dynamic conferences. Information and Computation, 146, 1–23. doi:10.1006/inco.1998.2717.

    Article  MATH  MathSciNet  Google Scholar 

  15. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In 11th IEEE International Conference on Network Protocols, 2003 Proceedings (Vol. 1, pp. 326–335). doi:10.1109/icnp.2003.1249782.

  16. Abdallah, W., Boudriga, N., Kim, D., & An, S. (2014). An efficient and scalable key management mechanism for wireless sensor networks. In 16th International Conference on Advanced Communication Technology, (pp. 687–692). doi:10.1109/icact.2014.6779051.

  17. Chakavarika, T. T., Chaurasia, B. K., Gupta, S. K. (2016). Performance evaluation of a polynomial based key management scheme in wireless sensor networks. In Proceedings of the International Conference on Communication and Signal Processing (Vol. 6, pp. 1768–1772).

  18. Greis, M. (2015). Marc Greis’ Tutorial for the UCB/LBNL/VINT Network Simulator “ns”. http://www.isi.edu/nsnam/ns/tutorial. Accessed 15 Nov 2015.

  19. Banerjee K., Sharma, H., & Chaurasia, B. K. (2014). Secure communication for cluster based wireless sensor network. In IEEE CICN (pp. 867–871). doi:10.1109/CICN.2014.183.

  20. Gupta, V., & Rajoo Pandey, R. (2016). An improved energy aware distributed unequal clustering protocol for heterogeneous wireless sensor networks. International Journal of Engineering Science and Technology, 19(5), 1050–1058. doi:10.1016/j.jestch.2015.12.015.

    Article  Google Scholar 

  21. Jain, G., Biradar, S. R., & Chaurasia, B. K. (2015). Cluster head selection heuristic using weight and rank in WSN. International Journal of Transactions on Computational Science, 25, 135–147. doi:10.1007/978-3-662-47074-9_8.

    MathSciNet  Google Scholar 

  22. Kim, J. M., Cho, J. S., Jung, S. M., & Chung, T. M. (2007). An energy-efficient dynamic key management in wireless sensor networks. In The 9th International Conference on Advanced Communication Technology (pp. 2148–2153). doi:10.1109/ICACT.2007.358798.

  23. Eltoweissy, M., Moharrum, M., & Mukkamala, R. (2006). Dynamic key management in sensor networks. IEEE Communications Magazine, 44, 122–130. doi:10.1109/MCOM.2006.1632659.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tafadzwa Tapuwa Chakavarika.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chakavarika, T.T., Gupta, S.K. & Chaurasia, B.K. Energy Efficient Key Distribution and Management Scheme in Wireless Sensor Networks. Wireless Pers Commun 97, 1059–1070 (2017). https://doi.org/10.1007/s11277-017-4551-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4551-2

Keywords

Navigation