Key management schemes in wireless sensor networks: a survey

Wireless sensor network WSN refers to a network consisting of sensor nodes or motes which are preloaded with software that primarily aims at the collection and safe transmission of various data obtained through the sensor arrays. In mission critical applications, there is an inherent need for incorporating security against node constraints environment. This paper substantiates in detail the various key management schemes KMSs which are classified based on communication patterns such as group keying, pair-wise and network wide mechanism. The overall aim of this paper is to conduct a comparative study of the existing schemes of KMS in WSNs on the basis of evaluation metrics such as key connectivity, scalability, efficiency, resilience and authentication. Key revocation is also discussed to arrive at a consensus about their usability in various scenarios and possibly highlight the tradeoffs possible in each method.

[1]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[2]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[3]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[4]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[5]  Manivannan Doraipandian,et al.  An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matrix , 2011, ACC.

[6]  Qiong Zhang,et al.  A centralized key management scheme for hierarchical access control , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[7]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[8]  Hangyang Dai,et al.  Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix , 2010, IEEE Sensors Journal.

[9]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[10]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[11]  Hui Li,et al.  A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks , 2007, PAKDD Workshops.

[12]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[13]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[14]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[15]  Ingrid Verbauwhede,et al.  Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .

[16]  Hsiao-Hwa Chen,et al.  Selecting key management schemes for WSN applications , 2012, Comput. Secur..

[17]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[18]  Vijay Varadharajan,et al.  A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[19]  K. J. Ray Liu,et al.  Scalable hierarchical access control in secure group communications , 2004, IEEE INFOCOM 2004.