Skip to main content

Advertisement

Log in

A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Resource-constrained Devices are extensively used on the Internet of Things (IoT). WSN, RFID, and embedded systems are examples of these devices that have processing and communication power, memory capacity, and energy constraints. One of the lightweight methods in key distribution in these devices is to use Key Pre-Distribution Schemes (KPSs). A feature of a combinatorial key pre-distribution scheme, which is considered a deterministic scheme in key distribution, can be kept constant, while that feature may only occur in random key distribution schemes with a certain probability. In this paper, a new key pre-distribution scheme based on combinatorial designs was introduced, and using theoretical analysis, it was shown that such a scheme had high scalability and resilience compared to schemes introduced in recent years. They also enjoyed a good connectivity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data Availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Solari Esfehani, N., Haj Seyyed Javadi, H. (2021). A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network. Wireless Networks, 27(4), 3025–3052.

    Article  Google Scholar 

  2. Where does the Internet of Things come from?. https://datafloq.com/read/where-does-the-internet-of-things-come-from/524.

  3. Sicari, A., Rizzardi, D., Miorandi, & Coen-Porisini., A. (2016). Internet of things: Security in the keys. In Q2SWinet MSWiM (pp. 129–133).

  4. Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the internet of things. Ad Hoc Networks, 32, 17–31.

    Article  Google Scholar 

  5. Paterson, M. B., & Stinson, D. R. (2014). A unified approach to combinatorial key predistribution schemes for sensor networks. Design, Codes and Cryptography, 71(3), 433–457.

    Article  MathSciNet  MATH  Google Scholar 

  6. Bahrami, P. N., Javadi, H. H., Dargahi, T., Dehghantanha, A., & Choo, K. R. (2019). A hierarchical key pre-distribution scheme for fog networks. Concurrency and Computation Practice and Experience, 31(22), e4776.

    Article  Google Scholar 

  7. Bose, M., Dey, A., & Mukerjee, R. (2013). Key predistribution schemes for distributed sensor networks via block designs. Design, Codes and Cryptography, 67(1), 111–136.

    Article  MathSciNet  MATH  Google Scholar 

  8. Henry, K. J., Paterson, M. B., & Stinson, D. R. (2014). Practical approaches to varying network size in combinatorial key predistribution schemes. In Selected Areas in Cryptography (SAC) 2013, number 8282 in Lecture Notes in Computer Science (pp. 89–117). Springer.

  9. Eschenauer, L., & Gligor, V. D. (2002). A key Management Scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 41–47). ACM.

  10. Chan, H., & Perrig, A. (2003). Random key predistribution schemes for sensor networks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP 03), (pp. 197–213). IEEE.

  11. Qian, S. (2012). A novel key pre-distribution for wireless sensor networks. Physics Procedia, 25, 2183–2189.

    Article  Google Scholar 

  12. Li, W. S., Tsai, C. W., Chen, M., Hsieh, W. S., & Yang, C. S. (2013). Threshold behavior of multi-path random key pre-distribution for sparse wireless sensor networks. Mathematical and Computer Modeling, 57(11), 2776–2787.

    Article  MathSciNet  MATH  Google Scholar 

  13. Catakoglu, O., & Levi, A. (2013). Uneven key pre-distribution scheme for multi-phase wireless sensor networks (pp. 359–368). Springer.

  14. Dargahi, T., Javadi, H. H. S., & Hosseinzadeh, M. (2015). Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Security and Communication Networks, 8(8), 1561–1574.

    Article  Google Scholar 

  15. Blom, R. (1984). An optimal class of symmetric key generation systems. In Advances in Cryptology: Proceedings of Eurocrypt 84, Lecture Notes in Computer Science (Vol. 209, pp. 335–338). Springer.

  16. Chien, H. Y., Chen, R. C., & Shen, A. (2008). Efficient key pre-distribution for sensor nodes with strong connectivity and low storage space. In Proceedings of the 2nd International Conference on Advanced Information Networking and Applications (AINA08) (pp. 327–333). GinoWan. IEEE.

  17. Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology: CRYPTO 92. LNCS (Vol. 740, pp. 471–486).

  18. Wang, N. C., & Chen, H. L. (2013). Improving pairwise key predistribution in wireless sensor networks. Advances in intelligent systems and applications (pp. 521–530). Springer.

    Google Scholar 

  19. Camtepe, S. A., & Yener, B. (2004). Combinatorial design of key distribution mechanisms for wireless sensor networks. In Samarati, P., Ryan, P. Y. A., Gollmann, D., Molva R. (Eds.), ESORICS, Volume 3193 of Lecture Notes in Computer Science (pp. 293–308). Springer.

  20. Camtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. Journal of ACM/IEEE Transactions on Networking, 15(2), 346–358.

    Article  MATH  Google Scholar 

  21. Lee, J., & Stinson, D. (2005). A combinatorial approach to key pre-distribution for distributed sensor networks. In IEEE Wireless Communications and Networking Conference (WCN’ 05), IEEE Communication Society (pp. 1200–1205).

  22. Ruj, S., & Roy,B. (2007). Key predistribution using partially balanced designs in wireless sensor networks. Proceedings of the 5th International Conference on Parallel and Distributed Processing and Applications (pp. 431–445).

  23. Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.

    Article  MathSciNet  MATH  Google Scholar 

  24. Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948–959.

    Article  Google Scholar 

  25. Modiri, V., Javadi, H. H. S., & Anzani, M. (2017). A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design. Wireless Personal Communications, 96, 2821–2841.

    Article  Google Scholar 

  26. Yuan, Q., Ma, C., Yu, H., & Bian, X. (2018). A key pre-distribution scheme based on μ-PBIBD for enhancing resilience in wireless sensor networks. Sensors, 18, 1539.

    Article  Google Scholar 

  27. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228–258.

    Article  Google Scholar 

  28. Lee, J., & Stinson, D. R. (2005). Deterministic key predistribution schemes for distributed sensor networks. Selected areas in cryptography (pp. 294–307). Springer.

    MATH  Google Scholar 

  29. Chakrabarti, D., Maitra, S., & Roy, B. (2006). A key pre-distribution scheme for wireless sensor networks: Merging blocks in combinatorial design. International Journal of Information Security, 5(2), 105–114.

    Article  MATH  Google Scholar 

  30. Kavitha, T., & Sridharan, D. (2012). Hybrid design of scalable key distribution for wireless sensor networks. IACSIT International Journal of Engineering and Technology, 2(2), 136–141.

    Google Scholar 

  31. Xia, G., Huang, Z., & Wang, Z. (2008). Key pre-distribution scheme for wireless sensor networks based on the symmetric balanced incomplete block design. Journal of Computer Research and Development, 45, 154–164.

    Google Scholar 

  32. Lee, J., & Stinson, D. R. (2008). On the construction of practical key predistributoin schemes for distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 11(2), 1–35.

    Article  Google Scholar 

  33. Morshed Aski, A., Javadi, H. H. S., & Shirdel, G. H. (2020). A full connectable and high scalable key pre-distribution scheme based on combinatorial designs for resource-constrained devices in IoT network. Wireless Personal Communications, 114(3), 2079–2103. https://doi.org/10.1007/s11277-020-07466-0.

    Article  Google Scholar 

Download references

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Haj Seyyed Javadi.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Solari Esfehani, N., Haj Seyyed Javadi, H. A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks. Wireless Pers Commun 127, 2905–2934 (2022). https://doi.org/10.1007/s11277-022-09903-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09903-8

Keywords

Navigation