Secure Path Key Establishment Schemes Based on Random Key Management for WSN


A large number of the path key establishment schemes regard same probability of the node capture attack for each node in the wireless sensor networks. However, in certain critical applications this statement may not be right making such schemes less practical for many real-world applications like border surveillance and disaster management. In this paper, an attack matrix (AM) is designed to calculate the attack coefficient of the sensor nodes at the time of their positioning in the sensor field. The path key exposure problem is minimized by bypassing the nodes with greatest value of attack coefficient. Three attack-resistant path key establishment schemes are presented based on the AM namely attack-resistant proxy-based path key establishment, attack-resistant friend-based path key establishment and attack-resistant disjoint path key establishment. We find that the proposed schemes show improved performance compared to the existing path key establishment schemes. The resistance against node capture of proposed schemes has been verified based on the probability of key recovery and path compromise ratio. The result outcomes prove their expediency in diminishing node capture impact.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8


  1. 1.

    He X, Neidermeier M, Meer HD (2013) Dynamic key management in wireless sensor network: a survey. J Netw Comput Appl 36:612–622

  2. 2.

    Ahlawat P, Dave M (2016) A hybrid approach for path vulnerability matrix on random key predistribution for wireless sensor networks. Wirel Pers Commun 94(4):3327–3353

  3. 3.

    Eschenauer L, Gligor V (2002) A key management scheme for distributed sensor networks. In: Proceedings of 9th ACM conference on computer and communications security, pp 41–47

  4. 4.

    Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of 2003 IEEE symposium on security and privacy, California, USA, pp 197–213

  5. 5.

    Du W, Deng J, Han Y, Chen S, Varshney PK, (2004) A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of IEEE INFOCOM’04, pp 586–597

  6. 6.

    Li G, Ling H, Znati T, Wu W (2006) A robust on-demand path-key establishment framework via random key predistribution for wireless sensor networks. EURASIP J Wirel Commun Netw 1:091304

  7. 7.

    Ling H, Znati T (2007) End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. Int J Netw Secur 2(1–2):109–121

  8. 8.

    Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inform Syst Ser 8(1):41–77

  9. 9.

    Talawar SH, Hansdah RC (2015) A protocol for end-to-end key establishment during route discovery in MANETs. In: 2015 IEEE 29th international conference on advanced information networking and applications, pp 176–184

  10. 10.

    Hayajneh T, Doomun R, Al-Mashaqbeh G, Mohd BJ (2014) An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur Commun Netw 7(11):2015–2038

  11. 11.

    Chan H, Perrig A (2005) PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings IEEE 24th annual joint conference of the IEEE computer and communications societies, vol 1, pp 524–535

  12. 12.

    Newell A, Yao H, Ryker A, HoT Nita-Rotaru C (2015) Node-capture resilient key establishment in sensor networks: design space and new protocols. ACM Comput Surv (CSUR) 47(2):24

  13. 13.

    Gupta J K, Nuggehalli P (2006)A new scheme for establishing pairwise keys for wireless sensor networks. In: International conference on distributed computing and networking, Springer, Berlin, pp 522–533

  14. 14.

    Deng J, HanY S (2013) Cooperative secret delivery in wireless sensor network. Int J Adhoc Ubiq Comput 14(4):226–237

  15. 15.

    Ghafoor A, Sher M, Imran M, Baig I (2016) Disjoint key establishment for wireless sensor and actor networks. J Sens 2016:15

  16. 16.

    Zhang K, Han Q, Yin G, Pan H (2016) OFDP: a distributed algorithm for finding disjoint paths with minimum total length in wireless sensor networks. J.Comb Optim 31(4):1623–1641

  17. 17.

    Liu D, Ning P (2003) Location based pairwise key establishment for static sensor networks. In: Proceedings of 1st ACM workshop on security of adhoc and sensor networks, pp 72–82

  18. 18.

    Lin C, Qiu T, Obaidat MS, Yu CW, Yao L, Wu G (2016) MREA: a minimum resource expenditure node capture attack in wireless sensor networks. Secur Commun Netw 9(18):5502–5517

  19. 19.

    An W, Ci S, Luo H, Han Y, Lin T, Tang D, Qi Y (2016) Vulnerability -constrained multiple minimum cost paths for multi-source wireless sensor networks. Secur Commun Netw 9(9):862–873

  20. 20.

    Lin C, WuG YuCW, Yao L (2015) Maximizing destructiveness of node capture attack in wireless sensor networks. J Supercomput 71(8):3181–3212

  21. 21.

    Lin C, WuG Xia F, Yao L (2013) Enhancing efficiency of node compromise attacks in vehicular ad-hoc networks using connected dominating set. Mob Netw Appl 18(6):908–922

  22. 22.

    Yu CM, Li CC, Lu CS, Kuo SY (2011) An application driven attack probability based deterministic pair-wise key predistribution scheme for non uniformly deployed sensor networks. Int J Sens Netw 9(2):89–106

  23. 23.

    Bechkit W, Challal Y, Bouadallah A (2013) A new class of hash chain based key predistribution scheme for WSN. Comput Commun 36(3):243–255

  24. 24.

    Li G, Ling H, Znati T (2005) Path key establishment using multiple secured paths in wireless sensor networks. In: Proceedings of the 2005 ACM conference on emerging network experiment and Technology, pp 43–49

  25. 25.

    Ghafoor A, Sher M, Imran M, Derhab A (2015) secure key distribution using fragmentation and assimilation in wireless sensor networks. Int J Distrib Sens Netw 11(9):542856

  26. 26.

    Stavrou E, Pitsillides A (2010) A survey on secure multipath routing protocols in WSNs. Comput Netw 54(13):2215–2238

  27. 27.

    Sheu JP, Cheng JC (2007) Pair-wise path key establishment in wireless sensor networks. Comput Commun 30(11):2365–2374

  28. 28.

    Zhang K, Gao H (2013) Efficient distributed algorithm for correctly finding disjoint paths in wireless sensor networks. Int J Sens Netw 13(3):173–184

  29. 29.

    Pandey A, Pant PK, Tripathi RC (2016) A system and method for authentication in wireless local area networks (WLANs). Proc Natl Acad Sci, India, Sect A 86(2):149–156

  30. 30.

    Rai AK, Tewari RR (2012) A secure framework for integrated manet-internet communication. Proc Natl Acad Sci, India, Sect A 82(3):251–255

  31. 31.

    Ahlawat P, Dave M (2018) A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security. Int J Commun Syst 31(12):e3713.

  32. 32.

    Ahlawat P, Dave M (2018) An attack resistant key predistribution scheme for wireless sensor networks. J King Saud Univ Comput Infor Sci.

Download references

Author information

Correspondence to Priyanka Ahlawat.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Ahlawat, P., Dave, M. Secure Path Key Establishment Schemes Based on Random Key Management for WSN. Proc. Natl. Acad. Sci., India, Sect. A Phys. Sci. (2020).

Download citation


  • Node capture attack
  • q-Composite scheme
  • Path key establishment
  • Random key predistribution scheme