HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks

  • Boushra Maala
  • Yacine Challal
  • Abdelmadjid Bouabdallah
Part of the IFIP – The International Federation for Information Processing book series (IFIPAICT, volume 264)


Early researches focused on the security of homogenous sensor networks. However, recent works have demonstrated that the presence of heterogeneous sensor nodes gives better performance than homogenous ones in terms of energy consumptions, storage overhead, and network connectivity. In this paper, we propose a hierarchical key management scheme named HERO which is based on random key pre-distribution. HERO aims to construct a secure tree instead of complete connected graph as in existing schemes. Thanks to this realistic assumption, our key management scheme reduces considerably the number of pre-loaded keys assigned to each node while maintaining high security level at the same time. The preliminary simulation results using TOSSIM demonstrates that our scheme outperforms existing ones with respect to storage overhead.


Sensor Network Sensor Node Wireless Sensor Network Storage Overhead Super Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Levis, P., Lee, N., Welsh, M., Culler, D. : TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Application. In: ACM SenSys. Los Angeles(2003)Google Scholar
  2. 2.
    Eschenauer, L., Gligor, V.D. : A key management scheme for distributed sensor networks. In: Proceedings of (CCS ’02.), pp. 41-47. Washington(2002)Google Scholar
  3. 3.
    Hussain, S., Kausar, F., Masood, A.: An efficient key distribution scheme for heterogeneous sensor networks. In: the international conference on wireless communications and mobile computing, pp. 388-392.Hawaii(2007)Google Scholar
  4. 4.
    Brown, J., Du, X., Nygrad, K. : An Efficient Public-Key-based Heterogeneous Sensor Network Key Distribution Scheme. In: IEEE GLOBECOM. Washington(2007)Google Scholar
  5. 5.
    Jason Lester H. : System Architecture for Wireless Sensor Network. In: PhD Dissertation, University of California, Berkeley (2003)Google Scholar
  6. 6.
    Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K. : System Architecture Directions for Networked Sensors. In: Proceeding of ACM ASPLOS IX. (2000)Google Scholar
  7. 7.
    Xu, N. : A Survey of Sensor Network Applications. In: Survey Paper for CS694a. Computer Science Department, University of Southern California (2002)Google Scholar
  8. 8.
    Camtepe, S. A., Yener, B. : Key Distribution Mechanisms for Wireless Sensor Networks: a Survey. In: TechReport TR-05-07. System Design Laboratory (2005)Google Scholar
  9. 9.
    Yarvis, M., Kushalnagar, N., Singh, H., Rangarajan, A., Liu, Y., Singh, S. : Exploiting Heterogeneity in Sensor Networks. In: IEEE INFOCOM’05. Miami(2005)Google Scholar
  10. 10.
    Gay, D., Levis, P., Behren, R., Welsh, M., Brewer, E., Culler, D. : The nesC language: A Holistic Approach to Networked Embedded System.In: Precedings of (PLDI).California (2003)Google Scholar
  11. 11.
    Du, X., Xiao, Y., Guizani, M., Chen,H-H.: An effective key management scheme for heterogenous sensor networks. Ad Hoc Networks, Elsevier. 5(1), 24–34, Jan (2007)CrossRefGoogle Scholar
  12. 12.
    Traynor, P., Kumar, K., Choi, H. : Effcient Hybrid Security Mechanisms for Heterogenous Sensor Networks. IEEE Trans.(MTC). 6(6), 663–677, Jun (2007)Google Scholar
  13. 13.
    Technology. Crossbow : http://www.xbow.comGoogle Scholar
  14. 14.
    UC. Berkeley : http://nescc.sourceforge.netGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Boushra Maala
    • 1
  • Yacine Challal
    • 1
  • Abdelmadjid Bouabdallah
    • 1
  1. 1.Universite de Technologie de CompiegneUMR CNRS 6599 Heudiasyc.

Personalised recommendations