Advertisement

Wireless Networks

, Volume 24, Issue 8, pp 2867–2879 | Cite as

Key-management scheme for wireless sensor networks based on merging blocks of symmetric design

  • Mohaddese Anzani
  • Hamid Haj Seyyed Javadi
  • Vahid Modirir
Article
  • 216 Downloads

Abstract

Wireless sensor networks as the key infrastructure of the new networking paradigm are vulnerable against different kinds of attacks. Therefore, ensuring a secure communication between the sensor nodes is important. One of the most critical issues in this regard is the key distribution mechanism. Due to the random deployment of the sensors in the target area, key pre-distribution is a promising approach, in which a list of keys, so-called key-ring, is pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share a common key from their key-rings. In this paper, we consider a hybrid key pre-distribution approach based on the symmetric design. We propose a new scheme, which is a modification of the hybrid symmetric design in order to improve the connectivity and resilience. Considering the trade-off between resilience and connectivity, we introduce a new parameter based on the application requirement. The experimental results and analytical analysis approve the efficiency of our proposed approach and introduced parameter.

Keywords

Wireless sensor network Security Key management Symmetric design 

References

  1. 1.
    Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96.CrossRefGoogle Scholar
  2. 2.
    Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.CrossRefGoogle Scholar
  3. 3.
    Anderson, I. (1990). Combinatorial designs: Construction methods. Chicester: Ellis Horwood.zbMATHGoogle Scholar
  4. 4.
    Anzani, M., Haj Seyyed Javadi, H., & Moeini, A. (2016). A deterministic key predistribution method for wireless sensor networks based on hypercube multivariate scheme. Iranian Journal of Science and Technology, Transactions A: Science. doi: 10.1007/s40995-016-0054-3.CrossRefGoogle Scholar
  5. 5.
    Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948–959.CrossRefGoogle Scholar
  6. 6.
    Blom, R. (1985). An optimal class of symmetric key generation systems. In Proceeding of eurocrypt, advances in cryptology (pp. 335–338). Springer.Google Scholar
  7. 7.
    Blundo, C., Santi, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992). Perfectly-secure key distribution for dynamic conferences. In Proceeding, advances in cryptology (CRYPTO 92) (pp. 471–486).CrossRefGoogle Scholar
  8. 8.
    Boyd, C., & Mathuria, A. (2003). Protocols for authentication and key establishment. In U. Maure & R. L. Rivest (Eds.). Berlin, Heidelberg: Springer.Google Scholar
  9. 9.
    Camtepe, S. A., & Yener, B. (2004). Combinatorial design of key distribution mechanisms for wireless sensor networks. In P. Samarati, P. Y. A. Ryan, D. Gollmann, & R. Molva (Eds.), ESORICS, volume 3193 of Lecture Notes in Computer Science (pp. 293–308). Springer.Google Scholar
  10. 10.
    Camtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), 346–358.CrossRefGoogle Scholar
  11. 11.
    Chakrabarti, D., Maitra, S., & Roy, B. (2006). A key predistribution scheme for wireless sensor networks: Merging blocks in combinatorial design. International Journal of Information Security, 5(2), 105–114.CrossRefGoogle Scholar
  12. 12.
    Chan, H., Perring, A., & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceeding of IEEE Symposium on Security and Privacy (pp. 197–213).Google Scholar
  13. 13.
    Chen, C. Y., & Chao, H. C. (2014). A survey of key distribution in wireless sensor networks. Security and Communication Networks, 7(12), 24952508.Google Scholar
  14. 14.
    Colbourn, C. J., & Dinitz, J. H. (Eds.). (2007). Handbook of combinatorial designs (2nd ed.). Boca Raton: CRC Press.zbMATHGoogle Scholar
  15. 15.
    Conti, M., Di Pietro, R., Mancini, L. V., & Mei, A. (2009). Mobility and cooperation to thwart node capture attacks in manets. EURASIP Journal on Wireless Communications and Networking, 2009, 1–13.CrossRefGoogle Scholar
  16. 16.
    Dargahi, T., Haj Seyyed Javadi, H., & Hosseinzadeh, M. (2015). Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Security and Communication Networks, 8(8), 1561–1574.CrossRefGoogle Scholar
  17. 17.
    Ehdaie, M., Alexiou, N., Ahmadian Attari, M., Aref, M. R., & Papadimitratos, P. (2015). Key splitting: Making random key distribution schemes resistant against node capture. Security and Communication Networks, 8, 431–445.CrossRefGoogle Scholar
  18. 18.
    Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceeding of the 9th ACM conference on computer and communications security (pp. 41–47).Google Scholar
  19. 19.
    Javanbakht, M., Erfani, H., Haj Seyyed Javadi, H., & Daneshjoo, P. (2014). Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs. Security and Communication Networks, 7(11), 2003–2014.CrossRefGoogle Scholar
  20. 20.
    Kavitha, T., & Sridharan, D. (2010). Hybrid design of scalable key distribution for wireless sensor networks. IACSIT International Journal of Engineering and Technology, 2(2), 136–141.Google Scholar
  21. 21.
    Lee, J., & Stinson, D. (2005). A combinatorial approach to key pre-distribution for distributed sensor networks. In IEEE wireless communications and networking conference (WCN’ 05), IEEE Communication Society (pp. 1200–1205).Google Scholar
  22. 22.
    Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.CrossRefGoogle Scholar
  23. 23.
    Memon, I., Chen, L., Majid, A., Lv, M., Hussain, I., & Chen, G. (2014). Travel recommendation using geo-tagged photos in social media for tourist. Wireless Personal Communications, 80(4), 1347–1362.CrossRefGoogle Scholar
  24. 24.
    Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.CrossRefGoogle Scholar
  25. 25.
    Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.CrossRefGoogle Scholar
  26. 26.
    Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1990). Handbook of applied cryptography. New York: CRC Press.zbMATHGoogle Scholar
  27. 27.
    Qian, S. (2012). A novel key pre-distribution for wireless sensor networks. Physics Procedia, 25, 2183–2189.CrossRefGoogle Scholar
  28. 28.
    Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.MathSciNetCrossRefGoogle Scholar
  29. 29.
    Ruj, S., & Roy, B. (2007). Key pre-distribution using partially balanced designs in wireless sensor networks. In 5th International symposium (ISPA) (pp. 431–445). Springer.Google Scholar
  30. 30.
    Srinivasa, K., Poornima, V., Archana, V., Reshma, C., Venugopal, K., & Patnaik, L. (2008). Combinatorial approach to key generation using multiple key spaces for wireless sensor networks. In ADCOM 2008, IEEE (pp. 279–284).Google Scholar
  31. 31.
    Stinson, D. (2004). Combinatorial designs: Construction and analysis. Berlin: Springer.zbMATHGoogle Scholar
  32. 32.
    Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52, 2292–2330.CrossRefGoogle Scholar
  33. 33.
    Zhang, J., & Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33(2), 63–75.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  • Mohaddese Anzani
    • 1
  • Hamid Haj Seyyed Javadi
    • 1
  • Vahid Modirir
    • 2
  1. 1.Department of Mathematics and Computer ScienceShahed universityTehranIran
  2. 2.Department of Computer EngineeringIslamic Azad University, Science and Research branchTehranIran

Personalised recommendations