Skip to main content

Toward a Lightweight Cryptographic Key Management System in IoT Sensor Networks

  • Conference paper
  • First Online:
The 6th International Conference on Wireless, Intelligent and Distributed Environment for Communication (WIDECOM 2023)

Abstract

Advances in the development of electronic components, particularly microprocessors, have enabled the manufacture of increasingly small and intelligent devices such as wireless sensors. These sensors, among other uses, are networked in a special type of ad hoc network called a wireless sensor network (WSN) and used in a variety of real-world applications, such as environmental monitoring, smart healthcare, or, more generally, where it is desired to be able to monitor a remote environment. Secure communication is an essential element of these types of networks because it requires the implementation of special mechanisms to ensure an acceptable level of security given the limited resources of the network equipment (sensors). In this chapter, we propose a scheme based on the functioning of the A-star algorithm to create paths and thus keys between the nodes of a network. The scheme exploits an algorithm using a cost function based on signal strength and cryptographic resources (cryptographic computations and memory occupied by the keys). The proposed scheme introduces a method of pre-distribution of keys with periodic renewal as well as on-demand renewal while simplifying the key management. Intensive simulations show that the proposed method outperforms the LEAP+ approach by around 13.21% in terms of RAM usage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ndam, N.A., Salifu, A., Djedouboum, A.C., Tchangmena, A.A.N., Ari, A.A.A., Adouane, A.M., Abdou, W., Gueroui, A.M.: Reduction of data transmission in an IoT wireless sensor network. In: Ngatched, T.M.N., Woungang, I., Tapamo, J.R., Viriri, S. (eds) Pan-African Artificial Intelligence and Smart Systems. PAAISS 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 459, pp. 39–57. Springer, Cham (2023)

    Google Scholar 

  2. Djam-Doudou, M., Ari, A.A.A., Emati, J.H.M., Njoya, A.N., Thiare, O., Labraoui, N., Gueroui, A.M.: A certificate-based pairwise key establishment protocol for IoT resource-constrained devices. In: Ngatched Nkouatchah, T.M., Woungang, I., Tapamo, J.-R., Viriri, S. (eds.), Pan-African Artificial Intelligence and Smart Systems, pp. 3–18. Springer Nature Switzerland, Cham, (2023). https://doi.org/10.1007/978-3-031-25271-6_1

    Chapter  Google Scholar 

  3. Hart, P.E., Nilsson, N.J., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Trans. Syst. Sci. Cybern. 4(2), 100–107 (1968). https://doi.org/10.1109/TSSC.1968.300136

    Article  Google Scholar 

  4. Babaghayou, M., Labraoui, N., Ari, A.A.A., Lagra, N., Ferrag, M.A., Maglaras, L.: SAMA: Security-aware monitoring approach for location abusing and UAV GPS-spoofing attacks on Internet of Vehicles. In: Jin, H., Liu, C., Pathan, AS.K., Fadlullah, Z.M., Choudhury, S. (eds.) Cognitive Radio Oriented Wireless Networks and Wireless Internet. CROWNCOM WiCON 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecom, vol. 427, pp. 343–360. Springer (2022)

    Google Scholar 

  5. Zhu, S., Setia, S., Jajodia, S.: Leap efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys ’03, pp. 308–309. Association for Computing Machinery, New York, NY, USA (2003). https://doi.org/10.1145/958491.958534

  6. Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks, in: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys ’04, pp. 162–175. Association for Computing Machinery, New York, NY, USA (2004). https://doi.org/10.1145/1031495.1031515

  7. Hamidouche, R., Aliouat, Z., Gueroui, A.M., Ari, A.A.A., Louail, L.: Classical and bio-inspired mobility in sensor networks for IoT applications. J. Network Comput. Appl. 121, 70–88 (2018). https://doi.org/10.1016/j.jnca.2018.07.010. https://www.sciencedirect.com/science/article/pii/S1084804518302340

  8. Kponhinto, G., Thiare, O., Ari, A.A.A., Gueroui, A.M., Khemiri-Kallel, S., Hwang, J.: Bio-inspired solution for cluster-tree based data collection protocol in wireless sensors networks. In: NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, pp. 1–6. IEEE (2023)

    Google Scholar 

  9. Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11), 2314–2341 (2007). Special issue on security on wireless ad hoc and sensor networks. https://doi.org/10.1016/j.comcom.2007.04.009. https://www.sciencedirect.com/science/article/pii/S0140366407001752

  10. Boumerzoug, H., Amar Bensaber, B., Biskri, I.: A key management method based on an AVL tree and ECC cryptography for wireless sensor networks. In: Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’11, pp. 57–62. Association for Computing Machinery, New York, NY, USA (2011). https://doi.org/10.1145/2069105.2069115

  11. Ari, A.A.A., Djedouboum, A.C., Njoya, A.N., Aziz, H.A., Gueroui, A.M., Mohamadou, A., Thiare, O., Labraoui, N.: Optimizing relay sensors in large-scale wireless sensor networks: A biologically inspired approach. Int. J. Eng. Res. Africa 63, 119–135 (2023)

    Article  Google Scholar 

  12. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Networks 38(4), 393–422 (2002). https://doi.org/10.1016/S1389-1286(01)00302-4. https://www.sciencedirect.com/science/article/pii/S1389128601003024

  13. Poornima, A., Amberker, B.: Tree-based key management scheme for heterogeneous sensor networks. In: 2008 16th IEEE International Conference on Networks, pp. 1–6. IEEE (2008)

    Google Scholar 

  14. Mamun, Q.E.K., Ramakrishnan, S.: SecCOSEn – a key management scheme for securing chain oriented sensor networks. In: 6th Annual Communication Networks and Services Research Conference (CNSR 2008), 2008, pp. 584–592. https://doi.org/10.1109/CNSR.2008.89

  15. Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2), 346–358 (2007). https://doi.org/10.1109/TNET.2007.892879

    Article  Google Scholar 

  16. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology, CRYPTO’99 (1999)

    Google Scholar 

  17. telosb, TelosB datasheet: http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/TelosB_Datasheet.pdf, Accessed: 2022-02-17 (2022)

  18. Wu, H.: ACORN: A lightweight authenticated cipher (v3). Candidate for the CAESAR competition. https://competitions.cr.yp.to/round3/acornv3.pdf

  19. Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security protocols for sensor networks. Wirel. Networks 8, 521–534 (2002). https://doi.org/10.1023/A:1016598314198

    Article  Google Scholar 

  20. Labraoui, N., Gueroui, M., Aliouat, M.: Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks. Trans. Emerg. Telecommun. Technol. 23, 303–316 (2012). https://doi.org/10.1002/ett.1532

    Article  Google Scholar 

  21. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pp. 41–47. Association for Computing Machinery, New York, NY, USA (2002). https://doi.org/10.1145/586110.586117

  22. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach (2003). https://doi.org/10.1109/ICNP.2003.1249782

  23. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pp. 41–47. Association for Computing Machinery, New York, NY, USA (2002). https://doi.org/10.1145/586110.586117

  24. Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005). https://doi.org/10.1145/1053283.1053287

    Article  Google Scholar 

  25. Rivest, R.: The RC5 encryption algorithm, Dr Dobb’s J 20. https://doi.org/10.1007/3-540-60590-8_7

Download references

Acknowledgements

We would like to thank the editor and the anonymous reviewers for their valuable remarks that helped us in better improving the content and presentation of the paper. Moreover, the author is grateful for the facilities provided by the DAVID Labs UPSay-UVSQ and its kind hospitality.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ado Adamou Abba Ari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ari, A.A.A. et al. (2024). Toward a Lightweight Cryptographic Key Management System in IoT Sensor Networks. In: Woungang, I., Dhurandher, S.K. (eds) The 6th International Conference on Wireless, Intelligent and Distributed Environment for Communication. WIDECOM 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 185. Springer, Cham. https://doi.org/10.1007/978-3-031-47126-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47126-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47125-4

  • Online ISBN: 978-3-031-47126-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics