A Hybrid Key Management Scheme for Wireless Sensor Network

  • Yanyan Han
  • Yanru HeEmail author
  • Peihe Liu
  • Xiaoxuan Yan
  • Na Li
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1105)


With the rapid development of the Internet of things (IoT), the wireless sensor network (WSN) as the most fundamental layer of the network is widely applied to the IoT, and more researchers focus on the security of WSN. Intrusion Detection System (IDS) is an important element in the security of computer system and smart devices. In this paper, a key management scheme which designed for WSN and based on area management is proposed under the premise that the system has IDS, and the scheme divides network into a number of non-overlapping hexagonal areas. In our scheme, two different key management modes are used for inter-regional and intra-regional communication respectively, and the certificates and keys of gateway node and cluster-head node can be efficiently managed by introducing the security gateway. The scheme not only can reduce the complexity of computation and storage effectively, but also improve the communication security and network connectivity.


WSN Key management Identity Authentication 


  1. 1.
    Yu, B., Zhou, W., Bin, Y., et al.: ZigBee model for detection and suppression of same-frequency attacks. J. Electron. Inf. Technol. 37(9), 2211–2217 (2015)Google Scholar
  2. 2.
    Lotfallahtabrizi, P., Morgan, Y.: A novel host intrusion detection system using neural network. In: Computing and Communication Workshop and Conference, pp. 124–130. IEEE (2018)Google Scholar
  3. 3.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 41–47 (2002)Google Scholar
  4. 4.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 197–213. IEEE (2003)Google Scholar
  5. 5.
    Du, W., Deng, J., Han, Y.S., et al.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004: Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, Hongkong, pp. 586–597. IEEE (2004)Google Scholar
  6. 6.
    Huang, D., Mehta, M., van de Liefvoort, A., et al.: Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. IEEE/ACM Trans. Netw. 15(5), 1204–1215 (2007)CrossRefGoogle Scholar
  7. 7.
    Wang, H., Yang, J., Wang, P., Tu, P.: Efficient pairwise key establishment scheme based on random pre-distribution keys in WSN. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, Bernady O. (eds.) ICCSA 2010. LNCS, vol. 6018, pp. 291–304. Springer, Heidelberg (2010). Scholar
  8. 8.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985). Scholar
  9. 9.
    Hussain, A.W., Ibrahem, M.K.: An efficient pairwise and group key management scheme for wireless sensor network. Int. J. Enhanc. Res. Sci. Technol. Eng. 1(4), 25–31 (2015)Google Scholar
  10. 10.
    Du, W., Deng, J., Han, Y.S., et al.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(2), 228–258 (2005)CrossRefGoogle Scholar
  11. 11.
    Blundo, C., Santis, A.D., Herzberg, A.: Perfectly-secure key distribution for dynamic conferences. Inf. Computat. 146(1), 1–23 (1998)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: ACM Conference on Computer and Communications Security, Dallas, USA, pp. 62–72. ACM (2003)Google Scholar
  13. 13.
    Jiang, R., Luo, J., Wang, X.: HRKT: a hierarchical route key tree based group key management for wireless sensor networks. KSII Trans. Internet Inf. Syst. 7(7), 2042–2060 (2013)Google Scholar
  14. 14.
    Jiang, R., Luo, J., Wang, X.: A logic-route key tree based group key management scheme for wireless sensor networks. In: 2013 IEEE/CIC International Conference on Communications in China (ICCC), Xi’an, pp. 686–691. IEEE Computer Society (2013)Google Scholar
  15. 15.
    Du, Y., Zhang, Y., Li, M., et al.: Optimization method of intrusion detection sample data based on improved FastICA algorithm. J. Commun. 37(1), 42–48 (2016)Google Scholar
  16. 16.
    Zhao, S., Zhang, Z.: Research on regular hexagon node coverage model of wireless sensor network. Comput. Eng. 36(20), 113–115+118 (2010)Google Scholar
  17. 17.
    Manikandan, G., Sakthi, U.: A comprehensive survey on various key management schemes in WSN. In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, pp. 378–383 (2018)Google Scholar
  18. 18.
    Gautam, A.K., Kumar, R.: A comparative study of recently proposed key management schemes in wireless sensor network. In: 2018 International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, Uttar Pradesh, India, pp. 512–517 (2018)Google Scholar
  19. 19.
    Bechkit, W., Challal, Y., Bouabdallah, A.: A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans. Wirel. Commun. 12(2), 948–959 (2013)CrossRefGoogle Scholar
  20. 20.
    Chakavarika, T.T., Chaurasia, B.K., Gupta, S.K.: Performance evaluation of a polynomial based key management scheme in wireless sensor networks. In: 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, pp. 2114–2118 (2016)Google Scholar
  21. 21.
    Kamble, S.B., Jog, V.V.: Efficient key management for dynamic wireless sensor network. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT), Bangalore, pp. 583–586 (2017)Google Scholar
  22. 22.
    Ahlawat, P., Dave, M.: An improved hybrid key management scheme for wireless sensor networks. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, pp. 253–258 (2016)Google Scholar
  23. 23.
    Msolli, A., Ameur, H.: A new secure key management scheme for wireless sensor network. In: 2017 International Conference on Control, Automation and Diagnosis (ICCAD), Hammamet, pp. 254–257 (2017)Google Scholar
  24. 24.
    Prema, S., Pramod, T.C.: Key establishment scheme for intra and inter cluster communication in WSN. In: 2018 Second International Conference on Computing Methodologies and Communication (ICCMC), Erode, pp. 942–944 (2018)Google Scholar
  25. 25.
    Patel, J.S., Chavda, V.M.: Security vulnerability and robust security requirements using key management in sensor network. Int. J. Grid Distrib. Comput. 7(3), 23–28 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Beijing Electronic Science and Technology InstituteBeijingChina
  2. 2.Xidian UniversityXi’anChina

Personalised recommendations