Dynamic key management in wireless sensor networks: A survey

Wireless sensor networks (WSNs) have a vast field of applications, including environment monitoring, battlefield surveillance and target tracking systems. As WSNs are usually deployed in remote or even hostile environments and sensor nodes are prone to node compromise attacks, the adoption of dynamic key management is extremely important. However, the resource-constrained nature of sensor nodes hinders the use of dynamic key management solutions designed for wired and ad hoc networks. Hence, many dynamic key management schemes have been proposed for WSNs recently. This paper investigates the special requirements of dynamic key management in sensor network environments, and introduces several basic evaluation metrics. In this work, the state of the art dynamic key management schemes are classified into different groups and summarized based on the evaluation metrics. Finally, several possible future research directions for dynamic key management are provided.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  Hattab Guesmi,et al.  Smart wireless sensor networks for online faults diagnosis in induction machine , 2015, Comput. Electr. Eng..

[3]  Gianluca Dini,et al.  An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[4]  Gicheol Wang,et al.  Lightweight Key Renewals for Clustered Sensor Networks , 2010, J. Networks.

[5]  Haiyun Luo,et al.  A two-tier data dissemination model for large-scale wireless sensor networks , 2002, MobiCom '02.

[6]  Yau-Hwang Kuo,et al.  Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[7]  Tanbhir Hoq,et al.  Micro hydro power: promising solution for off-grid renewable energy source , 2011 .

[8]  I-En Liao,et al.  A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[9]  Sanjay Kumar Madria,et al.  A survey of dynamic key management schemes in sensor networks , 2010 .

[10]  Kong Fan Collusion Problem of the EBS-Based Dynamic Key Management Scheme , 2009 .

[11]  Hoang Duc Chinh,et al.  Smart Wireless Sensor Networks , 2010 .

[12]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[13]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[14]  Peter I. Corke,et al.  Toward trusted wireless sensor networks , 2010, TOSN.

[15]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[16]  M. Dehghan,et al.  Key Management Mechanisms in Wireless Sensor Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[17]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[18]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[19]  Myong-Soon Park,et al.  An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[20]  Dong Hoon Lee,et al.  Classification of Key Management Schemes for Wireless Sensor Networks , 2007, APWeb/WAIM Workshops.

[21]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[22]  R. Divya,et al.  A novel dynamic key management scheme based on hamming distance for wireless sensor networks , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).

[23]  Xingming Sun,et al.  An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge , 2009, Comput. Commun..

[24]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[25]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[26]  Yuan Zhang,et al.  A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks , 2010, 2010 12th International Asia-Pacific Web Conference.

[27]  Sencun Zhu,et al.  A random perturbation-based scheme for pairwise key establishment in sensor networks , 2007, MobiHoc '07.

[28]  Sencun Zhu,et al.  Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.

[29]  Chin-Ling Chen,et al.  Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks , 2010, Sensors.

[30]  Ming-Hua Chang,et al.  List Decoding of Generalized Reed-Solomon Codes by Using a Modified Extended Key Equation Algorithm , 2011, EURASIP J. Wirel. Commun. Netw..

[31]  Yong Wang,et al.  A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations , 2008, 2008 IEEE International Conference on Communications.

[32]  Sencun Zhu,et al.  Predistribution and local collaboration-based group rekeying for wireless sensor networks , 2009, Ad Hoc Networks.

[33]  Chi-Chun Lo,et al.  An efficient and scalable EBS-based batch rekeying scheme for secure group communications , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[34]  Jongwan Kim,et al.  Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks , 2008, J. Inf. Sci. Eng..

[35]  Giuseppe Anastasi,et al.  An Analytical Study of Reliable and Energy-Efficient Data Collection in Sparse Sensor Networks with Mobile Relays , 2009, EWSN.

[36]  Heejo Lee,et al.  MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks , 2010, Ann. des Télécommunications.

[37]  Tzung-Pei Hong,et al.  A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKS , 2009 .

[38]  WenCheng Yang,et al.  An authentication protocol for hierarchy-based wireless sensor networks , 2008, 2008 23rd International Symposium on Computer and Information Sciences.

[39]  N. Dhinakaran,et al.  A survey of key predistribution schemes for key management in wireless sensor networks , 2010, ICN 2010.

[40]  Sun,et al.  Review of Key Management Mechanisms in Wireless Sensor Networks , 2006 .

[41]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[42]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[43]  Subhankar Chattopadhyay,et al.  A Survey on Key Pre-distribution Scheme in Homogeneous Wireless Sensor Networks , 2010 .

[44]  Ronald L. Rivest,et al.  Responses to NIST's proposal , 1992, CACM.

[45]  Sungyoung Lee,et al.  A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks , 2010, J. Comput. Sci. Eng..

[46]  Xing Zhang,et al.  EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[47]  Jin Myoung Kim,et al.  A*-based key tree structure generation for group key management in wireless sensor networks , 2008, Comput. Commun..

[48]  Shivakant Mishra,et al.  A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[49]  Peter Desnoyers,et al.  TSAR: a two tier sensor storage architecture using interval skip graphs , 2005, SenSys '05.

[50]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[51]  Chun-Wen Li,et al.  Collusion Problem of the EBS-Based Dynamic Key Management Scheme: Collusion Problem of the EBS-Based Dynamic Key Management Scheme , 2009 .

[52]  Yong Wang,et al.  An efficient scheme for removing compromised sensor nodes from wireless sensor networks , 2010, Secur. Commun. Networks.

[53]  Sajal K. Das,et al.  Group key distribution via local collaboration in wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[54]  Song Guo A Compromise-Resilient Pair-wise Rekeying Protocol in Large-Scale Wireless Sensor Networks , 2010 .

[55]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[56]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[57]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[58]  Makhlouf Aliouat,et al.  Tree Based Protocol for Key Management in Wireless Sensor Networks , 2010, EURASIP J. Wirel. Commun. Netw..

[59]  Mohamed Eltoweissy,et al.  TKGS: verifiable threshold-based key generation scheme in open wireless ad hoc networks , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).

[60]  Muhammad Khurram Khan,et al.  A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.

[61]  Tzung-Shi Chen,et al.  Data Aggregation for Range Query in Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[62]  Dirk Timmermann,et al.  Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.