Skip to main content

Advertisement

Log in

An efficient secure key establishment method in cluster-based sensor network

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The main issue for the security of wireless sensor networks (WSNs) is how to allow sensor nodes (SNs) to establish and share cryptographic keys in an energy-efficient, storage-efficient, and authentic manner for their secure data transmission. Furthermost recent studies carried out in this direction is concerned with homogeneous networks in which all sensor has identical characteristics and fundamental administration mechanisms. However, Cluster-based sensor networks have demonstrated better achievements and performance than homogeneous networks because of the several benefits of clustering. This inspired us to propose a secure key-establishment method for cluster-based sensor networks based on symmetric-key cryptography. Since symmetric key cryptography has small energy consumption, they are a great choice to prefer for securing the networks. Even though symmetric key cryptography has high storage needs, this deficiency can be reduced by using suitable methods—evaluating the proposed work that the storage needs are reduced along with reduced energy consumption. The work offers a favorable level of security against various intruders and possible security threats and is additionally scalable than the state-of-the-art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Cayirci, E., & Rong, C. (2009). Security in wireless ad hoc and sensor networks. Wiley.

    Book  Google Scholar 

  2. Bhasin, V., Kumar, S., Saxena, P. C., & Katti, C. P. (2020). Security architectures in wireless sensor network. International Journal of Information Technology, 12, 261–272. https://doi.org/10.1007/s41870-018-0103-6

    Article  Google Scholar 

  3. Agrawal, M., Zhou, J., Chang, D. (2019) A survey on lightweight authenticated encryption and challenges for securing industrial iot. In: Security and privacy trends in the industrial internet of things. Springer, pp 71–94.

  4. Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the internet of things. Ad Hoc Networks, 32, 17–31.

    Article  Google Scholar 

  5. Mohamed, R. E., Saleh, A. I., Abdelrazzak, M., & Samra, A. S. (2018). Survey on wireless sensor network applications and energy efficient routing protocols. Wireless Personal Communications, 101, 1019–1055. https://doi.org/10.1007/s11277-018-5747-9

    Article  Google Scholar 

  6. Padmavathi, B., & Kumari, S. R. (2013). A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution. International Journal of Science and Research, 2(4), 170–174.

    Google Scholar 

  7. Prakash, S., & Rajput, A. (2018). Hybrid cryptography for secure data communication in wireless sensor networks. In G. Perez, S. Tiwari, M. Trivedi, & K. Mishra (Eds.), Ambient communications and computer systems. Advances in intelligent systems and computing. Springer.

    Google Scholar 

  8. Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Advanced lightweight encryption algorithms for IoT devices: Survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-017-0494-4

    Article  Google Scholar 

  9. Jain, K., Kumar, A., & Vyas, V. (2020). A resilient steady clustering technique for sensor networks. International Journal of Applied Evolutionary Computation (IJAEC), 11(4), 1–12.

    Article  Google Scholar 

  10. Jain, K., & Kumar, A. (2020). Energy-efficient data-aggregation technique for correlated spatial and temporal data in cluster-based sensor networks. International Journal of Business Data Communications and Networking (IJBDCN), 16(2), 53–68. https://doi.org/10.4018/IJBDCN.2020070103

    Article  Google Scholar 

  11. Jain, K., & Bhola, A. (2018). Data aggregation design goals for monitoring data in wireless sensor net-works. Journal of Network Security Computer Net-works, 4(3), 1–9.

    Google Scholar 

  12. Mizanur Rahman, S., & El-Khatib, K. (2010). Private key agreement and secure communication for heterogeneous sensor networks. Journal of Parallel and Distributed Computing, 70, 858–870.

    Article  Google Scholar 

  13. Shi, Q., Zhang, N., Merabti, M., & Kifayat, K. (2013). Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. Journal of Parallel and Distributed Computing, 73(2), 235–249.

    Article  Google Scholar 

  14. Khemissa, H., Tandjaoui, D., & Bouzefrane, S. (2017). An ultra-lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In S. Bouzefrane, S. Banerjee, F. Sailhan, S. Boumerdassi, & E. Renault (Eds.), Mobile, secure, and programmable networking. MSPN 2017. Lecture Notes in Computer Science. Springer.

    Google Scholar 

  15. Darbandeh, F. G., & Safkhani, M. (2020). A new lightweight user authentication and key agreement scheme for WSN. Wireless Personal Communications, 114, 3247–3269. https://doi.org/10.1007/s11277-020-07527-4

    Article  Google Scholar 

  16. Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable tem-poral-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37–48.

    Article  Google Scholar 

  17. Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A. K., & Choo, K.-K.R. (2018). A three-factor anonymous authentication scheme for wireless sensor networks in inter-net of things environments. Journal of Network and Computer Applications, 103, 194–204.

    Article  Google Scholar 

  18. Mehra, P. S., Doja, M. N., & Alam, B. (2019). Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. International Journal of Communication Systems, 32, e3879. https://doi.org/10.1002/dac.3879

    Article  Google Scholar 

  19. Athmani, S., Bilami, A., & Boubiche, D. E. (2019). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, 92, 789–799.

    Article  Google Scholar 

  20. Mirvaziri, H., & Hosseini, R. (2020). A novel method for key establishment based on symmetric cryptography in hierarchical wireless sensor networks. Wireless Personal Communications, 112, 1–19.

    Article  Google Scholar 

  21. Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02020-z

    Article  Google Scholar 

  22. Khashan, O., Ahmad, R., & Khafajah, N. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks. https://doi.org/10.1016/j.adhoc.2021.1024

    Article  Google Scholar 

  23. Singh, A., Awasthi, A. K., & Singh, K. (2017). Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network. Wireless Personal Communications, 94, 1881–1898. https://doi.org/10.1007/s11277-016-3717-7

    Article  Google Scholar 

  24. Jain, K., & Kumar, A. (2020). An energy-efficient prediction model for data aggregation in sensor network. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-01833-2

    Article  Google Scholar 

  25. Issariyakul, T., & Hossain, E. (2012). Introduction to Network Simulator 2 (NS2). Springer Science+ Business Media. Springer.

    Book  Google Scholar 

  26. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.

    Article  Google Scholar 

Download references

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khushboo Jain.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, A., Jain, K. An efficient secure key establishment method in cluster-based sensor network. Telecommun Syst 79, 3–16 (2022). https://doi.org/10.1007/s11235-021-00844-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-021-00844-4

Keywords

Navigation