Key Management Schemes in Internet of Things: A Matrix Approach

  • Shubham AgrawalEmail author
  • Priyanka Ahlawat
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1132)


Internet of things (IoT) as a rising technology have a great potential to be used in essential scenarios such as battlefields and industrial applications like construction, traffic monitoring, environment watching and smart homes and many other situations. One of the major challenge IoT security face today is vulnerability to various attacks. It is important to consider the inherent security challenges, like securing the communication channel between two sensor nodes to increase its performance. In order to achieve it, it is necessary to apply key management mechanisms between the nodes to shield or protect the information flow. The purpose of this chapter is to introduce different matrix based key management schemes in IoT and give a deep understanding of some security mechanisms which are used to secure the communication channel. Key establishment could be a difficult problem due to the resource constrained sensor nodes. Despite the fact, several effective solutions are proposed but none of them is practical and appropriately suitable for extremely large amount of sensor nodes. This chapter presents significant matrix based key management systems that are implemented in real world for IoT security. This chapter present some of the techniques like BLOM’s, CARPY, KRONECKER PRODUCT and some other pairwise key management schemes. A comparison of different matrix based key management schemes is presented along with their merits and demerits.


  1. 1.
    Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)
  2. 2.
    Yu, C.-M., Lu, C.-S., Kuo, S.-Y.: A simple non-interactive pairwise key establishment scheme in sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE (2009)Google Scholar
  3. 3.
    Tsai, I.-C., Yu, C.-M., Yokota, H., Kuo, S.-Y.: Key management in Internet of Things via Kronecker product. In: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 118–124. IEEE (2017)Google Scholar
  4. 4.
    Whitmore, A., Agarwal, A., Da Xu, L.: The Internet of Things—a survey of topics and trends. Inf. Syst. Front. 17(2), 261–274 (2015)CrossRefGoogle Scholar
  5. 5.
    Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33(2), 63–75 (2010)CrossRefGoogle Scholar
  6. 6.
    Roman, R., et al.: Key management systems for sensor networks in the context of the Internet of Things. Comput. Electr. Eng. 37(2), 147–159 (2011)CrossRefGoogle Scholar
  7. 7.
    Li, S., Da Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243–259 (2015)CrossRefGoogle Scholar
  8. 8.
    Nafi, M., Bouzefrane, S., Omar, M.: Matrix-based key management scheme for IoT networks. Ad Hoc Netw. 97, 102003 (2019)CrossRefGoogle Scholar
  9. 9.
    Rahman, M., Sampalli, S.: An efficient pairwise and group key management protocol for wireless sensor network. Wirel. Pers. Commun. 84, 2035–2053 (2015)CrossRefGoogle Scholar
  10. 10.
    Blom, R.: An optimal class of symmetric key generation systems. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 335–338. Springer (1984)Google Scholar
  11. 11.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8, 228–258 (2005)CrossRefGoogle Scholar
  12. 12.
    Yu, Z., Guan, Y.: A key management scheme using deployment knowledge for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 19, 1411–1425 (2008)CrossRefGoogle Scholar
  13. 13.
    Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.): Futuristic Trends in Network and Communication Technologies. FTNCT (2018)Google Scholar
  14. 14.
    Shukla, A.S., Tripathi, S.: A matrix-based pair-wise key establishment for secure and energy efficient WSN-assisted IoT. Int. J. Inf. Secur. Priv. (IJISP) 13(3), 91–105 (2019)CrossRefGoogle Scholar
  15. 15.
    Akhbarifar, S., et al.: Hybrid key pre-distribution scheme based on symmetric design. Iran. J. Sci. Technol. Trans. A: Sci. 43, 2399–2406 (2019)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.NIT KurukshetraKurukshetraIndia

Personalised recommendations