A Comparative Study of Key Management Protocols for WSN

Full Text (PDF, 285KB), PP.29-36

Views: 0 Downloads: 0


Seema Verma 1,* Prachi 2

1. Department of Electronics Banasthali University, Rajasthan, India

2. CSE & IT Department ITM University, Gurgaon, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.04.04

Received: 1 Sep. 2013 / Revised: 2 Nov. 2013 / Accepted: 11 Dec. 2013 / Published: 8 Mar. 2014

Index Terms

Energy, key, memory, security, WSN


Increased employment of WSN (Wireless Sensor Network) in real life applications and their hostile and remote locations accelerate demand of security in WSN. Publicly accessible wireless communication channel also makes WSN vulnerable to numerous security attacks. Scarcity of resources acquaints new sort of challenges and difficulties during implementation of effective security mechanisms. In this paper, we evaluate and compare performance of three different security mechanisms (ECRKS, CKP and AP scheme). ECRKS (Energy-efficient, Connected, Resilient Key pre-distribution Scheme) is based upon multi hop communication architecture specifically designed for homogeneous WSN. Clustering based protocols, AP (Asymmetric pre-distribution) scheme and CKP (Clustering based Key management Protocol) are proposed for heterogeneous WSN. All the above mentioned schemes are simulated in MATLAB to evaluate their effectiveness and suitability for WSN. Simulation result shows that CKP outperforms other two schemes in terms of transmission distance, memory burden, energy dissipation and resilience.

Cite This Paper

Seema Verma, Prachi, "A Comparative Study of Key Management Protocols for WSN", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.4, pp.29-36, 2014. DOI:10.5815/ijcnis.2014.04.04


[1]B. Lai, S. Kim and I. Verbauwhede. Scalable Session Key Construction Protocols for Wireless Sensor Networks. In Proceedings of the IEEE Workshop on Large Scale RealTime and Embedded Systems, pp. 1-6, 2002.
[2]ZigBee Alliance. Zigbee specification document 053474r06, v1.0.Technical report, ZigBee Alliance, 2004.
[3]Y. Zeng, B. Zhao, J. Su, X. Yan and Z. Shao. A loop-based key management scheme for wireless sensor networks. Workshop on Emerging Directions in Embedded and Ubiquitous Computing, 2007. 4809: p. 103–114.
[4]H. Chan and A. Perrig. PIKE: peer intermediaries for key establishment in sensor networks. In proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005. 1: p. 524–535.
[5]H. Chan, V. Gligor, A. Perrig and G. Muralidharan. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing, 2005. 2(3): p. 233–247.
[6]J. M. Kim and T. H. Cho. A*-based key tree structure generation for group key management in wireless sensor networks. Computer Communications, 2008. 31: p. 2414–2419.
[7]F. Wu, H. T. Pai, X. Zhu, P. Y. Hsueh and Y. H. Hu. An adaptable and scalable group access control scheme for managing wireless sensor networks. Telematics and Informatics, 2013. 30: p. 144–157.
[8]J. Kohl and B. C. Neuman, The Kerberos Network Authentication Service (Version 5). Internet Request for Comments RFC-1510, 1993.
[9]A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks, 2002. 8: p. 521-534.
[10]W. Du, J. Deng, Y.S. Han, P. K. Varshney, J. Katz and A. Khalili. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security, 2005. 8(2): p. 228-258.
[11]M. Rahman, S. Sampalli and S. Hussain. A Robust Pair-wise and Group Key Management Protocol for Wireless Sensor Network. In 2010 IEEE GLOBECOM Workshops, 2010, pp. 1528-1532.
[12]D. Liu and P. Ning. Establishing Pairwise Keys in Distributed Sensor Networks. In proceedings of the 10th ACM conference on Computer and communications security. pp. 52-61, 2003.
[13]W. Bechkit, Y. Challal and A. Bouabdallah. A new class of Hash-Chain based key pre-distribution schemes for WSN. Computer Communications, 2013. 36(3): p. 243–255.
[14]W. Bechkit, Y. Challal and A. Bouabdallah. An Efficient and Highly Resilient Key Management Scheme for Wireless Sensor Networks. In 35th Annual IEEE Conference on Local Computer Networks, pp. 216 – 219, 2010.
[15]K. Ren, W. Lou and Y. Zhang. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Transactions On Mobile Computing, 2008. 7(5), p. 585-598.
[16]A. Gaur, S. Toshniwal, A. Prakash and D. P. Agrawal. Enhanced Location Based Key Pre-Distribution Scheme for Secure Communication in Wireless Sensor Network (WSN). In 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, pp. 552-557, 2010.
[17]L. Eschenauer and V. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of 9th ACM conference Computer and Communication Security, pp. 41-47, 2002.
[18]H. Chan, A. Perrig and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of 2003 IEEE Symposium on Security and Privacy, pp. 197-213, 2003.
[19]Hussain, S., Rahman, M., Yang, L. Key predistribution scheme using keyed-hash chain and multipath key reinforcement for wireless sensor networks. IEEE Computer Society, Los Alamitos, CA, USA, 2009, pp. 1–6. doi:10.1109/PERCOM.2009.4912893.
[20]Kesavan, V. T., Radhakrishnan, S. Multiple Secret Keys based Security for Wireless Sensor Networks. In International Journal of Communication Networks and Information Security (IJCNIS), 2012. 4(1): p. 68-76.
[21]W. Bechkit, Y. Challal, A. Bouabdallah and V. Tarokh. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 2013. 12(2): pp. 948-959.
[22]C. Castelluccia and A. Spognardi. RoK: A Robust Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks. In Proceedings of 3rd International ICST Conference on Security and Privacy in Communication Networks, pp. 351-360, 2007.
[23]S. Lawrence, L. Qiaoliang, N. Mary and F. Bo. Key Pre-Distribution and the Average Distance in Wireless Sensor Networks. In Second International Conference on Computer and Network Technology, pp. 212–216, 2010.
[24]W. Heinzelman, A. Chandrakasan and H. Balakrishnan. Energy-efficient communication protocol for wireless micro sensor networks. In Proceedings of 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, 2000.
[25]W. Heinzelman, A. Chandrakasan and H. Balakrishnan, An application-specific protocol architecture for wireless micro sensor networks, IEEE Transactions on Wireless Communications, 2002. 1: p. 660-670.
[26]O. Younis and S. Fahmy. Heed: A hybrid, energy- efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing, 2004. 3: p. 366-379.
[27]L. Girod, T. Stathopoulos, N. Ramanathan, J. Elson, D. Estrin, E. Osterweil and T. Schoellhammer, T, “A system for simulation, emulation, and deployment of heterogeneous sensor networks,” In proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 201-213, 2004.
[28]V. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar and N. Shroff. A minimum cost heterogeneous sensor network with a lifetime constraint. IEEE Transactions on Mobile Computing, 2005. 4: p. 4-15.
[29]M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu and S. Singh. Exploiting heterogeneity in sensor networks. In proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005. 2: p. 878-890.
[30]X. Du and Y. Xiao. Energy efficient chessboard clustering and routing in heterogeneous sensor network. International Journal of Wireless and Mobile Computing, 2006. 1: p. 121-130.
[31]X. Du, Y. Xiao, M. Guizani, and H. Chen. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks, 2007. 5: p. 24-34.
[32]P. Traynor, H. Choi, G. Cao, S. Zhu and T. L. Porta. Establishing Pair-wise Keys in Heterogeneous Sensor Networks. In proceedings of 25th IEEE International Conference on Computer Communications, pp. 1-12, 2006.
[33]B. Maala, Y. Challal and A. Bouabdallah. HERO: Hierarchical Key Management Protocol for Heterogeneous Wireless Sensor Networks. In proceeding of Wireless Sensor and Actor Networks II IFIP – The International Federation for Information Processing, 2008. 264: p. 125-136.
[34]S. Verma and Prachi. Key Pre-distribution Scheme for WSNs. Ad Hoc & Sensor Wireless Networks (Accepted).
[35]J. Spencer. The Strange Logic of Random Graphs. Algorithms and Combinatorics, vol. 22. Springer-Verlag, 2000.
[36]R. D. Pietro, L. V. Mancini, A. Mei, A. Panconesi, and J. Radhakrishnan. Redoubtable Sensor Networks. ACM Transactions on Information and Systems Security, 2008. 11(3): pp.13.1-13.22.
[37]S. Verma and Prachi, “A cluster based key management scheme for underwater wireless sensor network,” Communicated.
[38]S. Hussain and A. W. M. Jodrey. Energy efficient hierarchical cluster-based routing for wireless sensor networks. Technical Report - TR-2005-011, 2005.