A large number of the path key establishment schemes regard same probability of the node capture attack for each node in the wireless sensor networks. However, in certain critical applications this statement may not be right making such schemes less practical for many real-world applications like border surveillance and disaster management. In this paper, an attack matrix (AM) is designed to calculate the attack coefficient of the sensor nodes at the time of their positioning in the sensor field. The path key exposure problem is minimized by bypassing the nodes with greatest value of attack coefficient. Three attack-resistant path key establishment schemes are presented based on the AM namely attack-resistant proxy-based path key establishment, attack-resistant friend-based path key establishment and attack-resistant disjoint path key establishment. We find that the proposed schemes show improved performance compared to the existing path key establishment schemes. The resistance against node capture of proposed schemes has been verified based on the probability of key recovery and path compromise ratio. The result outcomes prove their expediency in diminishing node capture impact.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
He X, Neidermeier M, Meer HD (2013) Dynamic key management in wireless sensor network: a survey. J Netw Comput Appl 36:612–622
Ahlawat P, Dave M (2016) A hybrid approach for path vulnerability matrix on random key predistribution for wireless sensor networks. Wirel Pers Commun 94(4):3327–3353
Eschenauer L, Gligor V (2002) A key management scheme for distributed sensor networks. In: Proceedings of 9th ACM conference on computer and communications security, pp 41–47
Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of 2003 IEEE symposium on security and privacy, California, USA, pp 197–213
Du W, Deng J, Han Y, Chen S, Varshney PK, (2004) A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of IEEE INFOCOM’04, pp 586–597
Li G, Ling H, Znati T, Wu W (2006) A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks. EURASIP J Wirel Commun Netw 1:091304
Ling H, Znati T (2007) End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. Int J Netw Secur 2(1–2):109–121
Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inform Syst Ser 8(1):41–77
Talawar SH, Hansdah RC (2015) A protocol for end-to-end key establishment during route discovery in MANETs. In: 2015 IEEE 29th international conference on advanced information networking and applications, pp 176–184
Hayajneh T, Doomun R, Al-Mashaqbeh G, Mohd BJ (2014) An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur Commun Netw 7(11):2015–2038
Chan H, Perrig A (2005) PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings IEEE 24th annual joint conference of the IEEE computer and communications societies, vol 1, pp 524–535
Newell A, Yao H, Ryker A, HoT Nita-Rotaru C (2015) Node-capture resilient key establishment in sensor networks: design space and new protocols. ACM Comput Surv (CSUR) 47(2):24
Gupta J K, Nuggehalli P (2006)A new scheme for establishing pairwise keys for wireless sensor networks. In: International conference on distributed computing and networking, Springer, Berlin, pp 522–533
Deng J, HanY S (2013) Cooperative secret delivery in wireless sensor network. Int J Adhoc Ubiq Comput 14(4):226–237
Ghafoor A, Sher M, Imran M, Baig I (2016) Disjoint key establishment for wireless sensor and actor networks. J Sens 2016:15
Zhang K, Han Q, Yin G, Pan H (2016) OFDP: a distributed algorithm for finding disjoint paths with minimum total length in wireless sensor networks. J.Comb Optim 31(4):1623–1641
Liu D, Ning P (2003) Location based pairwise key establishment for static sensor networks. In: Proceedings of 1st ACM workshop on security of adhoc and sensor networks, pp 72–82
Lin C, Qiu T, Obaidat MS, Yu CW, Yao L, Wu G (2016) MREA: a minimum resource expenditure node capture attack in wireless sensor networks. Secur Commun Netw 9(18):5502–5517
An W, Ci S, Luo H, Han Y, Lin T, Tang D, Qi Y (2016) Vulnerability -constrained multiple minimum cost paths for multi-source wireless sensor networks. Secur Commun Netw 9(9):862–873
Lin C, WuG YuCW, Yao L (2015) Maximizing destructiveness of node capture attack in wireless sensor networks. J Supercomput 71(8):3181–3212
Lin C, WuG Xia F, Yao L (2013) Enhancing efficiency of node compromise attacks in vehicular ad-hoc networks using connected dominating set. Mob Netw Appl 18(6):908–922
Yu CM, Li CC, Lu CS, Kuo SY (2011) An application driven attack probability based deterministic pair-wise key predistribution scheme for non uniformly deployed sensor networks. Int J Sens Netw 9(2):89–106
Bechkit W, Challal Y, Bouadallah A (2013) A new class of hash chain based key predistribution scheme for WSN. Comput Commun 36(3):243–255
Li G, Ling H, Znati T (2005) Path key establishment using multiple secured paths in wireless sensor networks. In: Proceedings of the 2005 ACM conference on emerging network experiment and Technology, pp 43–49
Ghafoor A, Sher M, Imran M, Derhab A (2015) secure key distribution using fragmentation and assimilation in wireless sensor networks. Int J Distrib Sens Netw 11(9):542856
Stavrou E, Pitsillides A (2010) A survey on secure multipath routing protocols in WSNs. Comput Netw 54(13):2215–2238
Sheu JP, Cheng JC (2007) Pair-wise path key establishment in wireless sensor networks. Comput Commun 30(11):2365–2374
Zhang K, Gao H (2013) Efficient distributed algorithm for correctly finding disjoint paths in wireless sensor networks. Int J Sens Netw 13(3):173–184
Pandey A, Pant PK, Tripathi RC (2016) A system and method for authentication in wireless local area networks (WLANs). Proc Natl Acad Sci, India, Sect A 86(2):149–156
Rai AK, Tewari RR (2012) A secure framework for integrated manet-internet communication. Proc Natl Acad Sci, India, Sect A 82(3):251–255
Ahlawat P, Dave M (2018) A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security. Int J Commun Syst 31(12):e3713. https://doi.org/10.1002/dac.3713
Ahlawat P, Dave M (2018) An attack resistant key predistribution scheme for wireless sensor networks. J King Saud Univ Comput Infor Sci. https://doi.org/10.1016/j.jksuci.2018.03.002
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Ahlawat, P., Dave, M. Secure Path Key Establishment Schemes Based on Random Key Management for WSN. Proc. Natl. Acad. Sci., India, Sect. A Phys. Sci. (2020). https://doi.org/10.1007/s40010-020-00675-z
- Node capture attack
- q-Composite scheme
- Path key establishment
- Random key predistribution scheme