A survey on key management mechanisms for distributed Wireless Sensor Networks

Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in hostile environments. Thus, the adoption of security mechanisms is fundamental. However, the extremely constrained nature of sensors and the potentially dynamic behavior of WSNs hinder the use of key management mechanisms commonly applied in modern networks. For this reason, many lightweight key management solutions have been proposed to overcome these constraints. In this paper, we review the state of the art of these solutions and evaluate them based on metrics adequate for WSNs. We focus on pre-distribution schemes well-adapted for homogeneous networks (since this is a more general network organization), thus identifying generic features that can improve some of these metrics. We also discuss some challenges in the area and future research directions.

[1]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[2]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[3]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[4]  Donggang Liu,et al.  Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.

[5]  Albert Levi,et al.  A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks , 2009, Q2SWinet '09.

[6]  M. Dehghan,et al.  Key Management Mechanisms in Wireless Sensor Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[7]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[8]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[9]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[10]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[11]  Xingming Sun,et al.  An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge , 2009, Comput. Commun..

[12]  Ingrid Verbauwhede,et al.  Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.

[13]  Laurence T. Yang,et al.  Key predistribution scheme using keyed-hash chain and multipath key reinforcement for wireless sensor networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[14]  Robin Kravets,et al.  Improving Energy Conservation Using Bulk Transmission over High-Power Radios in Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[15]  T Beth,et al.  Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques , 1985 .

[16]  Bülent Yener,et al.  Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.

[17]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[18]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[19]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[20]  Hangyang Dai,et al.  Triangle-based key management scheme for wireless sensor networks , 2009 .

[21]  Jinshu Su,et al.  A Loop-Based Key Management Scheme for Wireless Sensor Networks , 2007, EUC Workshops.

[22]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[23]  Chinya V. Ravishankar,et al.  Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.

[24]  Ingrid Verbauwhede,et al.  Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .

[25]  Suresh Singh,et al.  Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[26]  Thomas F. La Porta,et al.  The effects of probabilistic key management on secure routing in sensor networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[27]  Albert Levi,et al.  A resilient key predistribution scheme for multiphase wireless sensor networks , 2009, 2009 24th International Symposium on Computer and Information Sciences.

[28]  Claude Castelluccia,et al.  RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[29]  Young-Koo Lee,et al.  Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[30]  Michael Scott,et al.  On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.

[31]  Abhishek Gupta,et al.  Deterministic schemes for key distribution in wireless sensor networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[32]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[33]  Kay Römer,et al.  Wireless sensor networks: a new regime for time synchronization , 2003, CCRV.

[34]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[35]  S. Manesis,et al.  A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[36]  Ajay Gupta,et al.  Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.

[37]  Jianzhong Li,et al.  Data Sampling Control and Compression in Sensor Networks , 2005, MSN.

[38]  S. Yau Mathematics and its applications , 2002 .

[39]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[40]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[41]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[42]  Donggang Liu,et al.  Group-based key predistribution for wireless sensor networks , 2008, TOSN.

[43]  Chuan-Ming Liu,et al.  Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[44]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[45]  Sun,et al.  Review of Key Management Mechanisms in Wireless Sensor Networks , 2006 .

[46]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[47]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[48]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[49]  Mohamed Ibnkahla,et al.  Wireless sensor networks: Applications and challenges , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.

[50]  Young-Koo Lee,et al.  HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).

[51]  Jolyon Clulow,et al.  Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks , 2007, SEC.

[52]  Paolo Santi Topology control in wireless ad hoc and sensor networks , 2005 .

[53]  Yongdae Kim,et al.  Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.

[54]  Adrian Perrig,et al.  Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes , 2007, SenSys '07.

[55]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[56]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[57]  Yu-Kwong Kwok,et al.  A Novel Key Redistribution Scheme for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[58]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[59]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[60]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[61]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[62]  I. Anderson Combinatorial Designs: Construction Methods , 1990 .

[63]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[64]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[65]  Rung Ching Chen,et al.  Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).

[66]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[67]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[68]  Jaydip Sen,et al.  An Efficient Certificate Authority for Ad Hoc Networks , 2007, ICDCIT.

[69]  Yong Guan,et al.  A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.

[70]  Douglas R. Stinson,et al.  Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.

[71]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[72]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[73]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[74]  Dong Hoon Lee,et al.  Classification of Key Management Schemes for Wireless Sensor Networks , 2007, APWeb/WAIM Workshops.

[75]  Ding-Zhu Du,et al.  New constructions on broadcast encryption key pre-distribution schemes , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[76]  Pierre-Louis Cayrel,et al.  A New Efficient Threshold Ring Signature Scheme Based on Coding Theory , 2008, IEEE Transactions on Information Theory.