CFP last date
01 May 2024
Reseach Article

A Research Study on different Key Management Strategies for Large Scale WSNs

by Premakumar M. N., Ramesh S
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 24
Year of Publication: 2018
Authors: Premakumar M. N., Ramesh S
10.5120/cae2018652801

Premakumar M. N., Ramesh S . A Research Study on different Key Management Strategies for Large Scale WSNs. Communications on Applied Electronics. 7, 24 ( Dec 2018), 1-10. DOI=10.5120/cae2018652801

@article{ 10.5120/cae2018652801,
author = { Premakumar M. N., Ramesh S },
title = { A Research Study on different Key Management Strategies for Large Scale WSNs },
journal = { Communications on Applied Electronics },
issue_date = { Dec 2018 },
volume = { 7 },
number = { 24 },
month = { Dec },
year = { 2018 },
issn = { 2394-4714 },
pages = { 1-10 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume7/number24/839-2018652801/ },
doi = { 10.5120/cae2018652801 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T20:02:22.950907+05:30
%A Premakumar M. N.
%A Ramesh S
%T A Research Study on different Key Management Strategies for Large Scale WSNs
%J Communications on Applied Electronics
%@ 2394-4714
%V 7
%N 24
%P 1-10
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless sensor network technology is immensely utilizing in multiple fields, for example; physical environment monitoring, surveillance systems, object tracking systems, robotic systems and many more. Usually, wireless sensor nodes are deployed in remote or hostile environments, and such sensors are vulnerable to compromise different attacks; therefore, a suitable and efficient key management scheme is essential at this point. Recently, different key management approaches are proposed by different researchers to address security challenges, especially for WSNs. Since key management is a core scheme to ensure security for network resources along with solving the problem of key generation, distribution, and secret key management. Hence, in this investigational study have to provide a detailed study on reliable key management techniques which are playing a vital role in large-scale WSNs. This study classifying the key management scheme into Asymmetric based and Symmetric based key management schemes and highlighting their functionalities by evaluating performance parameters. In the beginning, the study defines a workflow of the key management system followed by life cycle. Additionally, have briefly discussing popular key-management algorithmic approaches their applications and limitations.

References
  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) ‘A survey on sensor networks,' in IEEE Communications Magazine, Vol. 40, No. 8, pp.102–114.
  2. Zhou, Y., Fang, Y. and Zhang, Y. (2008) ‘Securing wireless sensor networks: a survey’, in IEEE Communications Surveys & Tutorials, Vol. 10, No. 3, pp.6–28.
  3. J. Zhang, V. Varadharajan, Wireless sensor network key management survey and taxonomy, Journal of Network and Computer Applications 33 (2) (2010) 63–75.
  4. X. He, M. Niedermeier, H. De Meer, Dynamic key management in wireless sensor networks: A survey, Journal of network and computer applications 36 (2) (2013) 611–622.
  5. X. Chen, K. Makki, K. Yen, N. Pissinou, Sensor network security: a survey, IEEE Communications Surveys & Tutorials 11 (2) (2009) 52 73.
  6. M. A. Simpl´ıcio Jr, P. S. Barreto, C. B. Margi, T. C. Carvalho, A survey on key management mechanisms for distributed wireless sensor networks, Computer Networks 54 (15) (2010) 2591–2612.
  7. T. Rams, P. Pacyna, A survey of group key distribution schemes with self-healing property, IEEE Communications Surveys & Tutorials 15 (2) (2013) 820–842.
  8. B. Tian, S. Han, S. Parvin, J. Hu, S. Das, Self-healing key distribution schemes for wireless networks: A survey, The Computer Journal 54 (4) (2011) 549–569.
  9. Q. Wang, Practicality analysis of the self-healing group key distribution schemes for resource-constricted wireless sensor networks, in: Third International Conference on Communications and Mobile Computing (CMC), IEEE, 2011, pp. 37–40.
  10. Katiyar, V., Chand, N. and Soni, S. (2010) ‘Clustering algorithms for heterogeneous wireless sensor networks: a survey’, International Journal of Applied Engineering Research, Vol. 1, No. 2, pp.273–274, Dindigul
  11. Bos, J.W., Kaihara, M.E., Kleinjung, T., Lenstra, A.K. and Montgomery, P.L. (2009) ‘On the security of 1024-bit RSA and 160-bit elliptic curve cryptography’, IACR Cryptology ePrint Archive, p.389.
  12. Bertier, M., Mostefaoui, A. and Tredan, G. (2010) ‘Low-cost secret-sharing in sensor networks’, in 2010 IEEE 12th International Symposium on High-Assurance Systems Engineering (HASE), pp.1–9.
  13. Claveirole, T., de Amorim, M.D., Abdalla, M. and Viniotis, Y. (2008) ‘Securing wireless sensor networks against aggregator compromises’, in IEEE Communications Magazine, Vol. 46, No. 4, pp.134–141.
  14. Roman, R., Lopez, J., Alcaraz, C., & Chen, H. H. (2011, March). SenseKey--Simplifying the Selection of Key Management Schemes for Sensor Networks. In Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on (pp. 789-794). IEEE.
  15. Lee, H., Kim, Y. H., Lee, D. H., & Lim, J. (2007). Classification of key management schemes for wireless sensor networks. In Advances in Web and Network Technologies, and Information Management (pp. 664- 673). Springer Berlin Heidelberg.
  16. Chan, H., Perrig, A., & Song, D. (2003, May). Random key predistribution schemes for sensor networks. In Security and Privacy, 2003. Proceedings. 2003 Symposium on (pp. 197-213). IEEE.
  17. Zhang, Y., Li, X., Liu, J., Yang, J. and Cui, B. (2012a) ‘A secure hierarchical key management scheme in wireless sensor networks’, International Journal of Distributed Sensor Networks, pp.1–8.
  18. Zhang, Y., Li, X., Yang, J., Liu, Y., Xiong, N. and Vasilakos, A.V. (2012b) ‘A real-time dynamic key management for hierarchical wireless multimedia sensor networks’, Multimedia Tools and Applications, Vol. 67, No. 1, pp.97–117.
  19. Younis, M. F., Ghumman, K., & Eltoweissy, M. (2006). Location-aware combinatorial key management scheme for clustered sensor networks. IEEE transactions on parallel and distributed systems, 17(8)m 865-882.
  20. Anzani, Mohaddese, Hamid Haj Seyyed Javadi, and Vahid Modirir. "Key-management scheme for wireless sensor networks based on merging blocks of symmetric design." Wireless Networks 24, no. 8 (2018): 2867-2879.
  21. J. Zhang, V. Varadharajan, Wireless sensor network key management survey and taxonomy, Journal of Network and Computer Applications 33 (2) (2010) 63–75.
  22. X. He, M. Niedermeier, H. De Meer, Dynamic key management in wireless sensor networks: A survey, Journal of network and computer applications 36 (2) (2013) 611–622.
  23. X. Chen, K. Makki, K. Yen, N. Pissinou, Sensor network security: a survey, IEEE Communications Surveys & Tutorials 11 (2) (2009) 52–73.
  24. M. A. Simpl´ıcio Jr, P. S. Barreto, C. B. Margi, T. C. Carvalho, A survey on key management mechanisms for distributed wireless sensor networks, Computer Networks 54 (15) (2010) 2591–2612.
  25. C. Castelluccia, A. Spognardi, Rok: A robust key pre-distribution protocol for multi-phase wireless sensor networks, in: Third International Conference on Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007., IEEE, 2007, pp. 351–360
  26. M. Ergun, A. Levi, E. Savas, A resilient key predistribution scheme for multiphase wireless sensor networks, in: 24th International Symposium on Computer and Information Sciences, ISCIS 2009., IEEE, 2009, pp. 375–380.
  27. K. Kalkan, S. Yilmaz, O. Z. Yilmaz, A. Levi, A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks, in: Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks, ACM, 2009, pp. 29–36.
  28. C.-Y. Chen, H.-C. Chao, A survey of key distribution in wireless sensor networks, Security and Communication Networks 7 (12) (2014) 2495– 2508.
  29. Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, M. Galloway, (a survey of key management schemes in wireless sensor networks, Computer Communications 30 (1112) (2007) 2314 – 2341, special issue on security on wireless ad hoc and sensor networks. doi:http://dx.doi.org/10.1016/j.comcom.2007.04.009
  30. A. K. Das, A survey on analytic studies of key distribution mechanisms in wireless sensor networks, Journal of Information Assurance and Security 5 (5) (2010) 526–553.
  31. A. S. Reegan, E. Baburaj, Key management schemes in wireless sensor networks: A survey, in: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), IEEE, 2013, pp. 813-820.
  32. O. Cheikhrouhou, Secure group communication in wireless sensor networks: A survey, Journal of Network and Computer Applicationsdoi: http://dx.doi.org/10.1016/j.jnca.2015.10.011.
  33. T. Rams, P. Pacyna, A survey of group key distribution schemes with self-healing property, IEEE Communications Surveys & Tutorials 15 (2) (2013) 820–842.
  34. B. Tian, S. Han, S. Parvin, J. Hu, S. Das, Self-healing key distribution schemes for wireless networks: A survey, The Computer Journal 54 (4) (2011) 549–569.
  35. Q. Wang, Practicality analysis of the self-healing group key distribution schemes for resource-constricted wireless sensor networks, in: Third International Conference on Communications and Mobile Computing (CMC), IEEE, 2011, pp. 37–40.
  36. Masdari, Mohammad, Safiyyeh Ahmadzadeh, and Moazam Bidaki. "Key management in wireless Body Area Network: Challenges and issues." Journal of Network and Computer Applications 91 (2017): 36-51.
  37. Qin, Danyang, Shuang Jia, Songxiang Yang, Erfu Wang, and Qun Ding. "A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks." Journal of Sensors 2016 (2016).
  38. Kim, Jiye, Jongho Moon, Jaewook Jung, and Dongho Won. "Security analysis and improvements of session key establishment for clustered sensor networks." Journal of Sensors 2016 (2016).
  39. Ghafoor, AtaUllah, Muhammad Sher, Muhammad Imran, and Imran Baig. "Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks." Journal of Sensors 2016 (2016).
  40. Laouid, Abdelkader, Abdelnasser Dahmani, Hani Ragab Hassen, Ahcène Bounceur, Reinhardt Euler, Farid Lalem, and Abdelkamel Tari. "A self-managing volatile key scheme for wireless sensor networks." Journal of Ambient Intelligence and Humanized Computing (2018): 1-16.
  41. Ghasemzadeh, Hamzeh, Ali Payandeh, and Mohammad Reza Aref. "Key management system for WSNs based on hash functions and elliptic curve cryptography." arXiv preprint arXiv:1711.08570 (2017).
  42. Kaur, Jugminder, Sandeep S. Gill, and Balwinder S. Dhaliwal. "Secure trust based key management routing framework for wireless sensor networks." Journal of Engineering 2016 (2016).
  43. Messai, Mohamed-Lamine, Hamida Seba, and Makhlouf Aliouat. "A lightweight key management scheme for wireless sensor networks." The Journal of Supercomputing 71, no. 12 (2015): 4400-4422.
  44. Abdallah, Walid, Noureddine Boudriga, Daehee Kim, and Sunshin An. "An efficient and scalable key management mechanism for wireless sensor networks." In Advanced Communication Technology (ICACT), 2015 17th International Conference on, pp. 480-493. IEEE, 2015.
  45. Mansour, Ismail, Gérard Chalhoub, and Pascal Lafourcade. "Key management in wireless sensor networks." Journal of sensor and actuator networks 4, no. 3 (2015): 251-273.
  46. Ezhilarasie, R., A. Umamakeswari, and T. Renugadevi. "Key management schemes in wireless sensor networks: a survey." International Journal of Advanced Intelligence Paradigms 7, no. 3-4 (2015): 222-239.
  47. Cui, Baojiang, Ziyue Wang, Bing Zhao, Xiaobing Liang, and Yuemin Ding. "Enhanced key management protocols for wireless sensor networks." Mobile Information Systems 2015 (2015).
  48. Chen, Chien-Ming, Xinying Zheng, and Tsu-Yang Wu. "A complete hierarchical key management scheme for heterogeneous wireless sensor networks." The Scientific World Journal 2014 (2014).
  49. W. Abdallah, N. Boudriga, D. Kim and S. An, "An efficient and scalable key management mechanism for Wireless Sensor Networks," 2015 17th International Conference on Advanced Communication Technology (ICACT), Seoul, 2015, pp. 480-493.
  50. Reegan, A. Selva, and E. Baburaj. "Key management schemes in wireless sensor networks: a survey." In Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on, pp. 813-820. IEEE, 2013.
  51. Sharmila, R., P. C. Gopi, and V. Vijayalakshmi. "A Survey Of Key Management Schemes In Wireless Sensor Networks." International journal of computer & organization trends 3, no. 9 (2003).
  52. Shaila, K., S. H. Manjula, K. R. Venugopal, and Lalit M. Patnaik. "Mobile node authentication using a key distribution scheme in wireless sensor networks." International Journal of Ad Hoc and Ubiquitous Computing 12, no. 1 (2013): 34-45.
  53. He, Xiaobing, Michael Niedermeier, and Hermann De Meer. "Dynamic key management in wireless sensor networks: A survey." Journal of Network and Computer Applications 36, no. 2 (2013): 611-622.
  54. Messai, Mohamed-Lamine, and Hamida Seba. "A survey of key management schemes in multi-phase wireless sensor networks." Computer Networks 105 (2016): 60-74.
  55. Paek, Kwang-Jin, Jongwan Kim, Chong-Sun Hwang, and Ui-Sung Song. "An energy-efficient key management protocol for large-scale wireless sensor networks." In Multimedia and Ubiquitous Engineering, 2007. MUE'07. International Conference on, pp. 201-206. IEEE, 2007.
  56. Bhaskar, Pranave Kumar, and Alwyn R. Pais. "A Chinese remainder theorem based key management algorithm for the hierarchical wireless sensor network." In International Conference on Distributed Computing and Internet Technology, pp. 311-317. Springer, Cham, 2015.
  57. Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cyirci, E.: Wireless Sensor Networks: A Survey. Computer Networks 38(4), 393–422 (2002)
  58. Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of ACM CCS (2002)
  59. Chan, H., Perrig, A., Song, D.: Random Key Pre distribution Schemes for Sensor Networks. In: IEEE Symposium on Research in Security and Privacy (2003)
  60. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: 10th ACM CCS, Washington D.C (2003)
  61. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
  62. Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE Infocom (2004).
  63. S, Ahmed & E, Salah & El-Sayed, Ayman. (2017). A Key Management Techniques in Wireless Sensor Networks. Communications on Applied Electronics. 7. 8-18. 10.5120/cae2017652600.
  64. Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004, October). TinyPK: securing sensor networks with public key technology. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (pp. 59-64). ACM.
  65. Malan, D. J., Welsh, M., & Smith, M. D. (2004, October). A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. 2004 First Annual IEEE Communications Society Conference on (pp. 71-80). IEEE.
  66. Ren, K., Yu, S., Lou, W., & Zhang, Y. (2009). Multi-user broadcast authentication in wireless sensor networks. IEEE Transactions on Vehicular Technology, 58(8), 4554-4564.
  67. Boneh, D., & Franklin, M. (2001, August). Identitybased encryption from the Weil pairing. In Annual International Cryptology Conference (pp. 213-229). Springer Berlin Heidelberg.
  68. Geng, Y. A. N. G., Rong, C. M., Veigner, C., Wang, J. T., & Cheng, H. B. (2006). Identity-based key agreement and encryption for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 13(4), 54-60.
  69. Zhang J, VaradharajanV. (2008, July).Group-based Wireless Sensor Network Security Scheme. In: The fourth international conference on wireless and mobile communications (ICWMC2008).
  70. Chan, H., & Perrig, A. (2005, March). PIKE: Peer intermediaries for key establishment in sensor networks. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE (Vol. 1, pp. 524-535). IEEE.
  71. Dutertre, B., Cheung, S., & Levy, J. (2004). Lightweight key management in wireless sensor networks by leveraging initial trust. Technical Report SRI-SDL-04- 02, SRI International.
  72. Chan, H., Perrig, A., & Song, D. (2003, May). Random key predistribution schemes for sensor networks. In Security and Privacy, 2003. Proceedings. 2003 Symposium on (pp. 197-213). IEEE.
  73. Liu, D., & Ning, P. (2003, October). Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 72-82). ACM.
  74. Liu, D., & Ning, P. (2005). Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(2), 204-239.
  75. Zhang, W., Tran, M., Zhu, S., & Cao, G. (2007, September). A random perturbation-based scheme for pairwise key establishment in sensor networks. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 90-99). ACM.
  76. Yu, Z., & Guan, Y. (2005, March). A robust group-based key management scheme for wireless sensor networks. In Wireless Communications and Networking Conference, 2005 IEEE (Vol. 4, pp. 1915-1920). IEEE.
  77. Lee, J., & Stinson, D. R. (2004, August). Deterministic key predistribution schemes for distributed sensor networks. In International Workshop on Selected Areas in Cryptography (pp. 294-307). Springer Berlin Heidelberg.
  78. Jang, J., Kwon, T., & Song, J. (2007, May). A time-based key management protocol for wireless sensor networks. In International Conference on Information Security Practice and Experience (pp. 314-328). Springer Berlin Heidelberg.
  79. Çamtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on networking, 15(2), 346-358.
  80. Camtepe, S. A., & Yener, B. (2004, September). Combinatorial design of key distribution mechanisms for wireless sensor networks. In European Symposium on Research in Computer Security (pp. 293-308). Springer Berlin Heidelberg.
  81. Younis, M. F., Ghumman, K., & Eltoweissy, M. (2006). Location-aware combinatorial key management scheme for clustered sensor networks. IEEE transactions on parallel and distributed systems, 17(8), 865-882.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptosystem (ECC) Encryption Key Management Security Wireless sensor networks