Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis

  • Premraj Mahajan
  • Anjali Sardana
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)


Security is one of the important and challenging aspects in wireless sensor network owing to their wireless nature combined with limited memory, energy, and computation. We can classify security issue of the wireless sensor network into five broad categories as cryptography techniques, key management, routing protocols, intrusion detection and data aggregation. Since the key management forms an underlying factor for efficient routing protocol and cryptography in wireless sensor network, we focus on key management issue. This paper outlines the constraints, security requirements and attacks, which are related to the key management and routing. Further novel classification of key distribution schemes have been proposed. The proposed novel classification and comparison distinctly brings to the fore gaps in the existing solutions of research which can be put to use by researchers in the area to identify current challenges for designing efficient key distribution scheme. The paper concludes with possible future research directions on key distribution in WSNs.


Key distribution schemes Security Sensor network 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Yong, W., et al.: A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials 8, 2–23 (2006)Google Scholar
  2. 2.
    Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEEE Wireless Communications 11, 6–28 (2004)CrossRefGoogle Scholar
  3. 3.
    Kausar, F., et al.: Key Management and Secure Routing in Heterogeneous Sensor Networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2008, pp. 549–554 (2008)Google Scholar
  4. 4.
    Habib, A.: Sensor network security issues at network layer. In: 2nd International Conference on Advances in Space Technologies, ICAST 2008, pp. 58–63 (2008)Google Scholar
  5. 5.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE, International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)Google Scholar
  6. 6.
    Huijuan, D., et al.: Selective forwarding attack detection using watermark in WSNs. In: ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, pp. 109–113 (2009)Google Scholar
  7. 7.
    Newsome, J., et al.: The Sybil attack in sensor networks: analysis & defenses. In: Third International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259–268 (2004)Google Scholar
  8. 8.
    Hu, Y.C., et al.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003, vol. 3, pp. 1976–1986. IEEE Societies (2003)Google Scholar
  9. 9.
    Kaiping, X., et al.: Security improvement on an efficient key distribution mechanism for large-scale Wireless Sensor Network. In: 2nd International Conference on Anti-Counterfeiting, Security and Identification, ASID 2008, pp. 140–143 (2008)Google Scholar
  10. 10.
    Haowen, C., et al.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 197–213 (2003)Google Scholar
  11. 11.
    Wenliang, D., et al.: A key management scheme for wireless sensor networks using deployment knowledge. In: Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004, 597 p. (2004)Google Scholar
  12. 12.
    Ibriq, J., Mahgoub, I.: A Hierarchical Key Establishment Scheme forWireless Sensor Networks. In: 21st International Conference on Advanced Information Networking and Applications, AINA 2007, pp. 210–219 (2007)Google Scholar
  13. 13.
    Pathan, A.S.K., Choong Seon, H.: Feasibility of PKC in resource-constrained wireless sensor networks. In: 11th International Conference on Computer and Information Technology, ICCIT 2008, pp. 13–20 (2008)Google Scholar
  14. 14.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor network. In: 9th ACM Conference on Computer and Communications Security, Washington DC, pp. 41–47 (2002)Google Scholar
  15. 15.
    Tasci, S.E., et al.: Simple and Flexible Random Key Predistribution Schemes for Wireless Sensor Networks Using Deployment Knowledge. In: International Conference on Information Security and Assurance, ISA 2008, pp. 488–494 (2008)Google Scholar
  16. 16.
    Lu, K., et al.: A framework for distributed key management schemes in heterogeneous wireless sensor networks. In: 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006, p. 7, 520 (2006)Google Scholar
  17. 17.
    Xiaojiang, D., et al.: A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks. In: IEEE International Conference on Communications, ICC 2007, pp. 3407–3412 (2007)Google Scholar
  18. 18.
    Banihashemian, S., Bafghi, A.G.: A new key management scheme in heterogeneous wireless sensor networks. In: 2010 The 12th International Conference on Advanced Communication Technology (ICACT), pp. 141–146 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Electronics and Computer Science DepartmentIITRoorkeeIndia

Personalised recommendations