Key-management scheme for wireless sensor networks based on merging blocks of symmetric design

AbstractWireless sensor networks as the key infrastructure of the new networking paradigm are vulnerable against different kinds of attacks. Therefore, ensuring a secure communication between the sensor nodes is important. One of the most critical issues in this regard is the key distribution mechanism. Due to the random deployment of the sensors in the target area, key pre-distribution is a promising approach, in which a list of keys, so-called key-ring, is pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share a common key from their key-rings. In this paper, we consider a hybrid key pre-distribution approach based on the symmetric design. We propose a new scheme, which is a modification of the hybrid symmetric design in order to improve the connectivity and resilience. Considering the trade-off between resilience and connectivity, we introduce a new parameter based on the application requirement. The experimental results and analytical analysis approve the efficiency of our proposed approach and introduced parameter.

[1]  Han-Chieh Chao,et al.  A survey of key distribution in wireless sensor networks , 2014, Secur. Commun. Networks.

[2]  Roberto Di Pietro,et al.  Mobility and Cooperation to Thwart Node Capture Attacks in MANETs , 2009, EURASIP J. Wirel. Commun. Netw..

[3]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[4]  C. Colbourn,et al.  Handbook of Combinatorial Designs , 2006 .

[5]  Yacine Challal,et al.  A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[6]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[7]  Imran Memon,et al.  Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC) , 2014, Wirel. Pers. Commun..

[8]  Hamid Haj Seyyed Javadi,et al.  A deterministic Key Predistribution Method for Wireless Sensor Networks Based on Hypercube Multivariate Scheme , 2018 .

[9]  Douglas R. Stinson,et al.  A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[10]  Bülent Yener,et al.  Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.

[11]  Hamid Haj Seyyed Javadi,et al.  Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs , 2014, Secur. Commun. Networks.

[12]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[13]  Sushmita Ruj,et al.  Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks , 2007, ISPA.

[14]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[15]  Imran Memon,et al.  A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks , 2015, Wirel. Pers. Commun..

[16]  T. Kavitha,et al.  Hybrid Design of Scalable Key Distribution for Wireless Sensor Networks , 2010 .

[17]  Imran Memon,et al.  Travel Recommendation Using Geo-tagged Photos in Social Media for Tourist , 2015, Wirel. Pers. Commun..

[18]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[19]  Panagiotis Papadimitratos,et al.  Key splitting: making random key distribution schemes resistant against node capture , 2015, Secur. Commun. Networks.

[20]  Tooska Dargahi,et al.  Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks , 2015, Secur. Commun. Networks.

[21]  Ivan Stojmenovic,et al.  Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.

[22]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[23]  N Shahsavari Pour Calculating the Project Network Critical Path in Uncertainty Conditions , 2010 .

[24]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[25]  Sun Qian,et al.  A Novel Key Pre-distribution for Wireless Sensor Networks , 2012 .

[26]  Liren Zhang,et al.  Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery , 2014, Wireless Personal Communications.

[27]  Song Guo,et al.  A Flexible and Efficient Key Distribution Scheme for Renewable Wireless Sensor Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[28]  K.R. Venugopal,et al.  Combinatorial Approach to Key Generation using Multiple Key Spaces for Wireless Sensor Networks , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[29]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[30]  I. Anderson Combinatorial Designs: Construction Methods , 1990 .

[31]  Subhamoy Maitra,et al.  A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design , 2005, International Journal of Information Security.

[32]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[33]  Imran Memon,et al.  Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme , 2015, Wirel. Pers. Commun..