Skip to main content
Log in

Key pre-distribution approach using block LU decomposition in wireless sensor network

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

At present, many types of applications rely on wireless sensor networks because of their availability and advantages. The working environments of the wireless sensor networks are usually hostile and difficult to access because the sensor nodes are distributed randomly to their environments. Due to the random distribution of the sensor nodes, none of these nodes can authenticate the other sensor nodes within their range. Therefore, these sensor nodes need a key agreement scheme that allows them to establish secure communication with one another, hence protecting the communicating information before being conveyed to the base station. This paper proposes a new and efficient key management scheme for wireless sensor network based on the polynomial pool-based key pre-distribution scheme and the block LU decomposition algorithm. The proposed scheme ensures that any two communicating nodes must share a common key before communication starts. The performance of the proposed scheme is evaluated based on network connectivity, resilience against node capture, memory overhead, energy consumption and the number of Sybil nodes and the messages needed by the adversary to break the entire network. Therefore, a simulation-based evaluation was conducted, and the simulation results were compared with related works. The simulation results show that the proposed scheme performs better compared to the existing approaches. The BLU-decomposition algorithm allows the proposed approach to use more than one space to obtain the shared keys and decrease the amount of pre-distributed information to the sensor nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Anita, E.M., Geetha, R., Kannan, E.: A novel hybrid key management scheme for establishing secure communication in wireless sensor networks. Wirel. Pers. Commun. 82(3), 1419–1433 (2015)

    Google Scholar 

  2. Banaie, F., Seno, S.A.H., Aljoufi, R.H., Budiarto, R.: MPKMS: a matrix-based pairwise key management scheme for wireless sensor networks. In: Proceeding of the Electrical Engineering Computer Science and Informatics vol. 1, no. 1, pp 462–467 (2014)

  3. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Annual International Cryptology Conference, Springer (1992)

  4. Bsoul, A.A., Manasrah, A.M., Nahar, K.M., Alshanaq, M.: Quid pro quo LEACH protocol. Int. J. Syst. Control Commun. 9(2), 106–135 (2018)

    Google Scholar 

  5. Çamtepe, S.A., Blent, Y.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2), 346–358 (2007)

    Google Scholar 

  6. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks ∗. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA (2002)

  7. Chen, J., Ji, K., Shi, Z., Liu, W.: Implementation of block algorithm for LU factorization. In: 2009 WRI World Congress on Computer Science and Information Engineering, IEEE (2009)

  8. Choi, S.J., Kim, K.T., Youn, H.Y.: An energy-efficient key predistribution scheme for secure wireless sensor networks using eigenvector. Int. J. Distrib. Sens. Netw. 9(6), 216–754 (2013)

    Google Scholar 

  9. Choi, S.J., Kyung, T.K., Hee, Y.Y.: An energy-efficient key predistribution scheme for secure wireless sensor networks using eigenvector. Int. J. Distrib. Sens. Netw. 9(6), 216754 (2013)

    Google Scholar 

  10. Dai, Hangyang, Hongbing, Xu: Key predistribution approach in wireless sensor networks using LU matrix. Sens. J. IEEE 10(8), 1399–1409 (2010)

    Google Scholar 

  11. Di Pietro, R., Mancini, L.V., Mei, A., Panconesi, A., Radhakrishnan, J.: Connectivity properties of secure wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM (2004)

  12. Divya, C., Jagannathan, J., SathishKumar, C., Krishnan, N.: Analysis and design of various key pre- distribution schemes. Int. J. Innov. Res. Comput. Commun. Eng. 2(4), 3899–3905 (2014)

    Google Scholar 

  13. Eschenauer, L., Gligor, V.D. A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), Washington, DC, USA (2002)

  14. Harn, L., Ching, F.H.: Predistribution scheme for establishing group keys in wireless sensor networks. IEEE Sens. J. 15(9), 5103–5108 (2015)

    Google Scholar 

  15. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, IEEE (2000)

  16. Ilakkiya, T.D., Jayakumar, C., Shobana, T.D.: A secure key pre-distribution scheme in wireless sensor networks using elliptic curve Diffie–Hellman key exchange. In: International Conference on Innovations in Intelligent Instrumentation, Optimization and Signal Processing (ICIIIOSP-2013), Coimbatore, India (2013)

  17. Jia, Y.B.: Polynomial multiplication and fast fourier transform. Com S 477, 577 (2014)

    Google Scholar 

  18. Khandke, M.A., Babar, S.D., Rane, S.R., Pawar, R.B., Gavale, S.J.: A novel deterministic key pre distribution schemes for wireless sensor network. Int. J. Adv. Res. Comp. Sci. Soft. Eng. 3(7), 1343–1350 (2013)

    Google Scholar 

  19. Mahmood, Zahid, Ning, Huansheng, Ghafoor, AtaUllah: A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors 17(4), 670 (2017)

    Google Scholar 

  20. Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for Sybil attack phases in internet of things. IEEE Internet Things J. 6(1), 379–387 (2019)

    Google Scholar 

  21. Mu, Kun, Li, Li: An efficient pairwise key predistribution scheme for wireless sensor networks. J. Netw. 9(2), 277–282 (2014)

    Google Scholar 

  22. Paar, C., Jan, P.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Berlin (2009)

    MATH  Google Scholar 

  23. Rafeh, Reza, Khodadadi, Mozhgan: Detecting Sybil nodes in wireless sensor networks using two-hop messages. Indian J. Sci. Technol. 7(9), 1359–1368 (2014)

    Google Scholar 

  24. Rehman, S.U., Bilal, M., Ahmad, B., Yahya, K.M., Ullah, A., Rehman, O.U.: Comparison based analysis of different cryptographic and encryption techniques using message authentication code (MAC) in wireless sensor networks (WSN). vol. 9, p 6 (2012)

  25. Rivest, R.L.: The RC5 encryption algorithm. In: International Workshop on Fast Software Encryption, Springer (1994)

  26. Singh, S.K., Singh, M.P., Singh, D.K.: Routing protocols in wireless sensor networks. Int. J. Comput. Sci. Eng. Survey 1(2), 36–83 (2010)

    Google Scholar 

  27. Ssu, Kuo-Feng, Wang, Wei-Tong, Chang, Wen-Chung: Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput. Netw. 53(18), 3042–3056 (2009)

    MATH  Google Scholar 

  28. Tandel, R.I.: Leach protocol in wireless sensor network : a survey. Int. J. Comput. Sci. Inf. Technol. 7(4), 1894–1896 (2016)

    Google Scholar 

  29. Tiwari, P., Saxena, V.P., Mishra, R.G., Bhavsar, D.: Wireless sensor networks: introduction, advantages, applications and research challenges introduction to wireless networks. HCTL Open Int. J. Technol. Innov. Res. 14, 2321 (2015)

    Google Scholar 

  30. Wu, WanQing, Zhang, HuanGuo, Wang, HouZhen, Mao, ShaoWu, Jia, JianWei, Liu, JinHui: A public key cryptosystem based on data complexity under quantum environment. Sci. China Inf. Sci. 58(11), 1–11 (2015)

    MathSciNet  Google Scholar 

  31. Xiao, Liang, Wan, Xiaoyue, Han, Zhu: PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans. Wirel. Commun. 17(3), 1676–1687 (2017)

    Google Scholar 

  32. Yang, Mee, Al-Anbuky, Adnan, Liu, William: An authenticated key agreement scheme for wireless sensor networks. J. Sens. Actuator Netw. 3(3), 181–206 (2014)

    Google Scholar 

  33. Yum, D.H., Lee, P.J.: Exact formulae for resilience in random key predistribution schemes. IEEE Trans. Wirel. Commun. 11(5), 1638–1642 (2012)

    Google Scholar 

  34. Zhang, J., Li, H., Li, J.: Key establishment scheme for wireless sensor networks based on polynomial and random key predistribution scheme. Ad Hoc Netw. 71, 68–77 (2018)

    Google Scholar 

  35. Zhang, Ying, Liang, Jixing, Zheng, Bingxin, Chen, Wei: A hybrid key management scheme for WSNs based on PPBR and a tree-based path key establishment method. Sensors 16(4), 509 (2016)

    Google Scholar 

  36. Zhao, L., Ye, L.: Pair-wise key predistribution using the deployment knowledge in WSN. In: Proceedings of the 2nd International Conference on Soft Computing in Information Communication Technology (SCICT 2014), Taipei, Taiwan (2014)

  37. Zheng, J., Jamalipour, A.: Wireless Sensor Networks: A Networking Perspective. Wiley, Hoboken (2009)

    MATH  Google Scholar 

  38. Zhu, Lina, Zhang, Zuochang, Li, Jianhua, Zhou, Renjie: An improved random key predistribution scheme for wireless sensor networks using deployment knowledge Lina. Int. J. Secur. Appl. 10(5), 225–234 (2016)

    Google Scholar 

  39. Zia, T., Zomaya, A.Y.: A lightweight security framework for wireless sensor networks. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. 2(3), 53–73 (2011)

    Google Scholar 

Download references

Acknowledgements

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Areej R. AL-Rabadi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manasrah, A.M., AL-Rabadi, A.R. & Kofahi, N.A. Key pre-distribution approach using block LU decomposition in wireless sensor network. Int. J. Inf. Secur. 19, 579–596 (2020). https://doi.org/10.1007/s10207-019-00477-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-019-00477-4

Keywords

Navigation