Abstract
At present, many types of applications rely on wireless sensor networks because of their availability and advantages. The working environments of the wireless sensor networks are usually hostile and difficult to access because the sensor nodes are distributed randomly to their environments. Due to the random distribution of the sensor nodes, none of these nodes can authenticate the other sensor nodes within their range. Therefore, these sensor nodes need a key agreement scheme that allows them to establish secure communication with one another, hence protecting the communicating information before being conveyed to the base station. This paper proposes a new and efficient key management scheme for wireless sensor network based on the polynomial pool-based key pre-distribution scheme and the block LU decomposition algorithm. The proposed scheme ensures that any two communicating nodes must share a common key before communication starts. The performance of the proposed scheme is evaluated based on network connectivity, resilience against node capture, memory overhead, energy consumption and the number of Sybil nodes and the messages needed by the adversary to break the entire network. Therefore, a simulation-based evaluation was conducted, and the simulation results were compared with related works. The simulation results show that the proposed scheme performs better compared to the existing approaches. The BLU-decomposition algorithm allows the proposed approach to use more than one space to obtain the shared keys and decrease the amount of pre-distributed information to the sensor nodes.
Similar content being viewed by others
References
Anita, E.M., Geetha, R., Kannan, E.: A novel hybrid key management scheme for establishing secure communication in wireless sensor networks. Wirel. Pers. Commun. 82(3), 1419–1433 (2015)
Banaie, F., Seno, S.A.H., Aljoufi, R.H., Budiarto, R.: MPKMS: a matrix-based pairwise key management scheme for wireless sensor networks. In: Proceeding of the Electrical Engineering Computer Science and Informatics vol. 1, no. 1, pp 462–467 (2014)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Annual International Cryptology Conference, Springer (1992)
Bsoul, A.A., Manasrah, A.M., Nahar, K.M., Alshanaq, M.: Quid pro quo LEACH protocol. Int. J. Syst. Control Commun. 9(2), 106–135 (2018)
Çamtepe, S.A., Blent, Y.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2), 346–358 (2007)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks ∗. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA (2002)
Chen, J., Ji, K., Shi, Z., Liu, W.: Implementation of block algorithm for LU factorization. In: 2009 WRI World Congress on Computer Science and Information Engineering, IEEE (2009)
Choi, S.J., Kim, K.T., Youn, H.Y.: An energy-efficient key predistribution scheme for secure wireless sensor networks using eigenvector. Int. J. Distrib. Sens. Netw. 9(6), 216–754 (2013)
Choi, S.J., Kyung, T.K., Hee, Y.Y.: An energy-efficient key predistribution scheme for secure wireless sensor networks using eigenvector. Int. J. Distrib. Sens. Netw. 9(6), 216754 (2013)
Dai, Hangyang, Hongbing, Xu: Key predistribution approach in wireless sensor networks using LU matrix. Sens. J. IEEE 10(8), 1399–1409 (2010)
Di Pietro, R., Mancini, L.V., Mei, A., Panconesi, A., Radhakrishnan, J.: Connectivity properties of secure wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM (2004)
Divya, C., Jagannathan, J., SathishKumar, C., Krishnan, N.: Analysis and design of various key pre- distribution schemes. Int. J. Innov. Res. Comput. Commun. Eng. 2(4), 3899–3905 (2014)
Eschenauer, L., Gligor, V.D. A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), Washington, DC, USA (2002)
Harn, L., Ching, F.H.: Predistribution scheme for establishing group keys in wireless sensor networks. IEEE Sens. J. 15(9), 5103–5108 (2015)
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, IEEE (2000)
Ilakkiya, T.D., Jayakumar, C., Shobana, T.D.: A secure key pre-distribution scheme in wireless sensor networks using elliptic curve Diffie–Hellman key exchange. In: International Conference on Innovations in Intelligent Instrumentation, Optimization and Signal Processing (ICIIIOSP-2013), Coimbatore, India (2013)
Jia, Y.B.: Polynomial multiplication and fast fourier transform. Com S 477, 577 (2014)
Khandke, M.A., Babar, S.D., Rane, S.R., Pawar, R.B., Gavale, S.J.: A novel deterministic key pre distribution schemes for wireless sensor network. Int. J. Adv. Res. Comp. Sci. Soft. Eng. 3(7), 1343–1350 (2013)
Mahmood, Zahid, Ning, Huansheng, Ghafoor, AtaUllah: A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors 17(4), 670 (2017)
Mishra, A.K., Tripathy, A.K., Puthal, D., Yang, L.T.: Analytical model for Sybil attack phases in internet of things. IEEE Internet Things J. 6(1), 379–387 (2019)
Mu, Kun, Li, Li: An efficient pairwise key predistribution scheme for wireless sensor networks. J. Netw. 9(2), 277–282 (2014)
Paar, C., Jan, P.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Berlin (2009)
Rafeh, Reza, Khodadadi, Mozhgan: Detecting Sybil nodes in wireless sensor networks using two-hop messages. Indian J. Sci. Technol. 7(9), 1359–1368 (2014)
Rehman, S.U., Bilal, M., Ahmad, B., Yahya, K.M., Ullah, A., Rehman, O.U.: Comparison based analysis of different cryptographic and encryption techniques using message authentication code (MAC) in wireless sensor networks (WSN). vol. 9, p 6 (2012)
Rivest, R.L.: The RC5 encryption algorithm. In: International Workshop on Fast Software Encryption, Springer (1994)
Singh, S.K., Singh, M.P., Singh, D.K.: Routing protocols in wireless sensor networks. Int. J. Comput. Sci. Eng. Survey 1(2), 36–83 (2010)
Ssu, Kuo-Feng, Wang, Wei-Tong, Chang, Wen-Chung: Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput. Netw. 53(18), 3042–3056 (2009)
Tandel, R.I.: Leach protocol in wireless sensor network : a survey. Int. J. Comput. Sci. Inf. Technol. 7(4), 1894–1896 (2016)
Tiwari, P., Saxena, V.P., Mishra, R.G., Bhavsar, D.: Wireless sensor networks: introduction, advantages, applications and research challenges introduction to wireless networks. HCTL Open Int. J. Technol. Innov. Res. 14, 2321 (2015)
Wu, WanQing, Zhang, HuanGuo, Wang, HouZhen, Mao, ShaoWu, Jia, JianWei, Liu, JinHui: A public key cryptosystem based on data complexity under quantum environment. Sci. China Inf. Sci. 58(11), 1–11 (2015)
Xiao, Liang, Wan, Xiaoyue, Han, Zhu: PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans. Wirel. Commun. 17(3), 1676–1687 (2017)
Yang, Mee, Al-Anbuky, Adnan, Liu, William: An authenticated key agreement scheme for wireless sensor networks. J. Sens. Actuator Netw. 3(3), 181–206 (2014)
Yum, D.H., Lee, P.J.: Exact formulae for resilience in random key predistribution schemes. IEEE Trans. Wirel. Commun. 11(5), 1638–1642 (2012)
Zhang, J., Li, H., Li, J.: Key establishment scheme for wireless sensor networks based on polynomial and random key predistribution scheme. Ad Hoc Netw. 71, 68–77 (2018)
Zhang, Ying, Liang, Jixing, Zheng, Bingxin, Chen, Wei: A hybrid key management scheme for WSNs based on PPBR and a tree-based path key establishment method. Sensors 16(4), 509 (2016)
Zhao, L., Ye, L.: Pair-wise key predistribution using the deployment knowledge in WSN. In: Proceedings of the 2nd International Conference on Soft Computing in Information Communication Technology (SCICT 2014), Taipei, Taiwan (2014)
Zheng, J., Jamalipour, A.: Wireless Sensor Networks: A Networking Perspective. Wiley, Hoboken (2009)
Zhu, Lina, Zhang, Zuochang, Li, Jianhua, Zhou, Renjie: An improved random key predistribution scheme for wireless sensor networks using deployment knowledge Lina. Int. J. Secur. Appl. 10(5), 225–234 (2016)
Zia, T., Zomaya, A.Y.: A lightweight security framework for wireless sensor networks. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. 2(3), 53–73 (2011)
Acknowledgements
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Manasrah, A.M., AL-Rabadi, A.R. & Kofahi, N.A. Key pre-distribution approach using block LU decomposition in wireless sensor network. Int. J. Inf. Secur. 19, 579–596 (2020). https://doi.org/10.1007/s10207-019-00477-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-019-00477-4