Performance Evaluation of Key Management Schemes in Wireless Sensor Networks

Wireless sensor networks usually consist of a large number of ultra-small autonomous devices. Each device, called sensor node, is battery powered and equipped with integrated sensors, a data processing unit, and a short-range radio communication unit. Sensor nodes are significantly constrained in terms of energy, memory, and computational capacity. Wireless sensor networks are being deployed in wide variety of applications, including military sensing and tracking, environment monitoring, patient monitoring and tracking, smart environments, etc. When a wireless sensor network is deployed in such hostile environment, security becomes an extremely important issue. Confidentiality, authenticity, availability, and integrity are typical security goals for wireless sensor networks. Providing these goals to secure communication among sensor nodes typically depends on the use of cryptographic schemes. When employing a cryptographic scheme, a key management service is always required. This paper investigates the most important key management schemes in wireless sensor networks. Namely, single network-wide key scheme, pairwise key establishment scheme, random key predistribution, and Q-composite random key predistribution schemes are explained in detail. These key management schemes are evaluated using OMNET++ simulator and extensive simulation results are presented.

[1]  Vlado Handziski,et al.  A Mobility Framework for OMNeT , 2003 .

[2]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[3]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[4]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[5]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[6]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[7]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[8]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[9]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[10]  Habib M. Ammari Challenges and Opportunities of Connected-k-Covered Wireless Sensor Networks - From Sensor Deployment to Data Gathering , 2009, Studies in Computational Intelligence.

[11]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[12]  S. Manesis,et al.  A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[13]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[14]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[15]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[16]  Rudolf Hornig,et al.  An overview of the OMNeT++ simulation environment , 2008, Simutools 2008.

[17]  Andreas Willig,et al.  Protocols and Architectures for Wireless Sensor Networks , 2005 .

[18]  András Varga,et al.  An overview of the OMNeT++ simulation environment , 2008, SimuTools.

[19]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[20]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[21]  Mário Serafim Nunes,et al.  Chaos Based Key Management Architecture for Wireless Sensor Networks , .

[22]  Su Zhong,et al.  Key Management Schemes and Protocols for Wireless Sensor Networks , 2007 .

[23]  S. Wang,et al.  Simulation of Wireless Sensor Networks Localization with OMNeT , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.

[24]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[25]  Mohamed Ibnkahla,et al.  Wireless sensor networks: Applications and challenges , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.

[26]  Weiren Shi,et al.  Comparison of OMNET++ and other simulator for WSN simulation , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[27]  Sun,et al.  Review of Key Management Mechanisms in Wireless Sensor Networks , 2006 .

[28]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[29]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.