Simple and Efficient Key Management Method for Hierarchical Wireless Sensor Networks

Mohammed A. Altaha, Wisam Mahmood Lafta, Ghazwan Abdulnabi Al Ali, Ahmed Adil Alkadhmawee

Abstract


Security is an important consideration for Wireless Sensor Networks (WSNs), and key management plays a pivotal role in facilitating safe communication and data transfer. Key management must be designed with the constraints of these networks in mind, which include limited computation capabilities, memory, and energy. Achieving secure and efficient communication in large-scale WSNs is a significant challenge. In this paper, we propose a simple key management method for securing hierarchical WSNs, which employs only a few hash functions and XOR operations to derive shared keys. Its simplicity makes optimal use of resources and offers an efficient approach to establishing keys for sensor nodes. Simulation results demonstrate that the proposed scheme reduces energy consumption by 15% and decreases the key establishment time by 20% compared to existing methods such as LKMS, while maintaining strong security with low computational and communication costs, which are crucial considerations for WSNs.

Keywords


Hash function, Key management, XOR operation, Wireless sensor network.

References


T. Qiu, N. Chen, K. Li, D. Qiao, and Z. Fu, “Heterogeneous ad hoc networks: Architectures, advances and challenges,” Ad Hoc Networks, vol. 55, pp. 143–152, 2017.

M. M. Afsar and M.-H. Tayarani-N, “Clustering in sensor networks: A literature survey,” Journal of Network and Computer applications, vol. 46, pp. 198–226, 2014.

M. A. Altaha, A. A. Alkadhmawee, and W. M. Lafta, “Uneven clustering and fuzzy logic based energyefficient wireless sensor networks,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 25, no. 2, pp. 1011–1019, 2022.

X. He, M. Niedermeier, and H. De Meer, “Dynamic key management in wireless sensor networks: A survey,” Journal of network and computer applications, vol. 36, no. 2, pp. 611–622, 2013.

S. Abdollahzadeh and N. J. Navimipour, “Deployment strategies in the wireless sensor network: A comprehensive review,” Computer Communications, vol. 91, pp. 1–16, 2016.

A. A. Alkadhmawee, M. A. Altaha, and W. M. Lafta, “Unequal clustering algorithm with ida* multi-hop routing to prevent hot spot problem in wsns,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 20, no. 1, pp. 445–453, 2020.

R. Di Pietro, S. Guarino, N. V. Verde, and J. Domingo-Ferrer, “Security in wireless ad-hoc networks–a survey,” Computer Communications, vol. 51, pp. 1–20, 2014.

A. Albakri, L. Harn, and S. Song, “Hierarchical key management scheme with probabilistic security in a wireless sensor network (wsn),” Security and communication networks, vol. 2019, no. 1, p. 3950129, 2019.

S. P. Singh and S. C. Sharma, “A survey on cluster based routing protocols in wireless sensor networks,”Procedia computer science, vol. 45, pp. 687–695, 2015.

L. Chen, J. Ji, and Z. Zhang, Wireless network security. Springer, 2013.

Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,”IEEE Internet of things Journal, vol. 4, no. 5, pp. 1250–1258, 2017.

M. A. El-Bendary, Developing security tools of WSN and WBAN networks applications. Springer, 2015.

J.-M. Huang, S.-B. Yang, and C.-L. Dai, “An efficient key management scheme for data-centric storage wireless sensor networks,” IERI Procedia, vol. 4, pp. 25–31, 2013.

G.-C. Yang, S.-l. Ao, and L. An, IAENG transactions on engineering technologies. Springer, 2015.

Y. Wang and J. Zhao, “Key management scheme for wireless sensor networks,” in Wireless Internet: 10th International Conference, WiCON 2017, Tianjin, China, December 16-17, 2017, Proceedings 10. Springer, 2018, pp. 272–283.

L.-C. Wuu, C.-H. Hung, and C.-M. Chang, “Quorum-based key management scheme in wireless sensor networks,” in Proceedings of the 6th international conference on ubiquitous information management and communication, 2012, pp. 1–6.

B. Daghighi, M. L. Mat Kiah, S. Iqbal, M. H. U. Rehman, and K. Martin, “Host mobility key management in dynamic secure group communication,” Wireless Networks, vol. 24, pp. 3009–3027, 2018.

M. Anzani, H. Haj Seyyed Javadi, and V. Modirir, “Key-management scheme for wireless sensor networks based on merging blocks of symmetric design,” Wireless Networks, vol. 24, pp. 2867–2879, 2018.

M. A. Al-taha and A. M. Ra’ad, “Lightweight key management scheme for hierarchical wireless sensor networks,” in Proceedings of 7th International Conference on Computer Science, Engineering & Applications (ICCSEA 2017). Aircc Publishing Corporation, 2017, pp. 139–147.

M. S. Yousefpoor and H. Barati, “Dskms: a dynamic smart key management system based on fuzzy logic in wireless sensor networks,” Wireless Networks, vol. 26, no. 4, pp. 2515–2535, 2020.

A. Singh, A. K. Awasthi, and K. Singh, “Lightweight multilevel key management scheme for large scale wireless sensor network,” in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2016, pp. 3014–3017.

Q. Cheng, C. Hsu, and L. Harn, “Lightweight noninteractive membership authentication and group key establishment for wsns,” Mathematical Problems in Engineering, vol. 2020, no. 1, p. 1452546, 2020.

A. Helali, A. Msolli, H. Maaref, and R. Mghaieth, “Kmph: Key management scheme based on pool-hash for wsn,” Journal of Circuits, Systems and Computers, vol. 30, no. 01, p. 2150003, 2021.

V. Arumugam, A. Seshasayanam et al., “An adaptive multilevel location based key management system for dynamic wireless sensor networks,” International Journal of Applied Science and Engineering, vol. 18, no. 1, pp. 1–11, 2021.

V. Kumar, N. Malik, G. Dhiman, and T. K. Lohani, “Scalable and storage efficient dynamic key management scheme for wireless sensor network,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–11, 2021.

P. Ahlawat and M. Dave, “Secure path key establishment schemes based on random key management for wsn,” Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, vol. 91, pp. 555–567, 2021.

C. Shorten and T. M. Khoshgoftaar, “A survey on image data augmentation for deep learning,” Journal of big data, vol. 6, no. 1, pp. 1–48, 2019.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats

Error. Page cannot be displayed. Please contact your service provider for more details. (4)