Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

IHKM: an improved hierarchical key management scheme for wireless sensor network

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) are widely acknowledged for their potential as a robust infrastructure for collecting, processing, and transmitting information. Rezaeipour & Barati proposed a hierarchical key management scheme that manages key creation, distribution, and maintenance to provide services like message confidentiality, integrity, and authenticity to wireless sensor networks. As per the assertions posited by the authors, their scheme purportedly exhibits resilience against a spectrum of potential threats. Nevertheless, upon subjecting their scheme to meticulous scrutiny, our analysis revealed vulnerabilities to manifold adversarial strategies, notably including man-in-the-middle attacks, replay attacks, impersonation attacks, and node capture attacks. This scheme fails to establish a secure session key agreement also. In response to these identified shortcomings, this research devised an “Improved Hierarchical Key Management” (IHKM) Scheme aimed at rectifying the deficiencies of Rezaeipour and Barati’s scheme (RB scheme). This work proposed an enhanced key management scheme that utilizes a blend of symmetric and asymmetric key cryptography to enhance the security parameters of Hierarchical WSNs. A comprehensive security analysis of the proposed work shows that the IHKM scheme is secure against impersonation attacks, man-in-the-middle attacks, replay attacks node capture attacks, Denial-of-Service attacks, and base station bypassing attacks while establishing the mutual key agreement between the area managers and sensor nodes. Moreover, a comparative analysis of the IHKM scheme exhibits notable reductions in energy consumption (62.27% and 49.15%) and memory utilization (39.28%, 23.36%) when compared with the RB scheme and HISCOM schemes respectively. Simultaneously, IHKM contributes to the extension of the network’s overall lifespan by 48.78% as compared to HISCOM scheme and 32.63% as compared to compared with the RB scheme, thereby enhancing the efficiency and longevity of the WSN infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Data sharing does not apply to this article as no datasets were generated or analyzed during the current study.

References

  1. Jain, K., Kumar, A., & Singh, A. (2022). Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022. Transactions on Emerging Telecommunications Technologies, 34, e4674.

    Article  Google Scholar 

  2. Chan, L., Gomez Chavez, K., Rudolph, H., & Hourani, A. (2020). Hierarchical routing protocols for wireless sensor network: A compressive survey. Wireless Networks, 26(5), 3291–3314.

    Article  Google Scholar 

  3. Agarwal, A., Jain, K., & Dev, A. (2022). BFL: A buffer based linear filtration method for data aggregation in wireless sensor networks. International Journal of Information Technology, 14(3), 1445–1454.

    Article  Google Scholar 

  4. Singh, A., Awasthi, A. K., Singh, K., & Srivastava, P. K. (2018). Modeling and analysis of worm propagation in wireless sensor networks. Wireless Personal Communications, 98(3), 2535–2551.

    Article  Google Scholar 

  5. Jain, K., & Kumar, A. (2021). A lightweight data transmission reduction method based on a dual prediction technique for sensor networks. Transactions on Emerging Telecommunications Technologies, 32(11), e4345.

    Article  Google Scholar 

  6. Jia, C., Ding, H., Zhang, C., & Zhang, X. (2021). Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology. Alexandria Engineering Journal, 60(1), 337–346.

    Article  Google Scholar 

  7. Singh, A., & Jain, K. (2022). An automated lightweight key establishment method for secure communication in WSN. Wireless Personal Communications, 124, 1–21.

    Article  Google Scholar 

  8. Yuan, E., Wang, L., Cheng, S., Ao, N., & Guo, Q. (2020). A key management scheme based on pairing-free identity based digital signature algorithm for heterogeneous wireless sensor networks. Sensors, 20(6), 1543.

    Article  Google Scholar 

  9. Singh, A., & Jain, K. (2022). An efficient secure key establishment method in cluster-based sensor network. Telecommunication Systems, 79(1), 3–16.

    Article  Google Scholar 

  10. Singh, A., Awasthi, A. K., & Singh, K. (2017). Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network. Wireless Personal Communications, 94(3), 1881–1898.

    Article  Google Scholar 

  11. Singh, A., Awasthi, A. K., & Singh, K. (2016). Lightweight multilevel key management scheme for large scale wireless sensor network. In 2016 3rd international conference on computing for sustainable global development (INDIACom) (pp. 3014–3017). IEEE.

  12. Khan, T., Singh, K., Manjul, M., Ahmad, M. N., Zain, A. M., & Ahmadian, A. (2022). A Temperature-aware trusted routing scheme for sensor networks: Security approach. Computers & Electrical Engineering, 98, 107735.

    Article  Google Scholar 

  13. Wu, Y., Ru, Y., Lin, Z., Liu, C., Xue, T., Zhao, X., & Chen, J. (2022). Research on cyber-attacks and defensive measures of power communication network. IEEE Internet of Things Journal.

  14. Hussein, S. M., López Ramos, J. A., & Ashir, A. M. (2022). A secure and efficient method to protect communications and energy consumption in IoT wireless sensor networks. Electronics, 11(17), 2721.

    Article  Google Scholar 

  15. Mezrag, F., Bitam, S., & Mellouk, A. (2022). An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks. Journal of Network and Computer Applications, 200, 103282.

    Article  Google Scholar 

  16. Velmurugadass, P., Dhanasekaran, S., Anand, S. S., & Vasudevan, V. (2022). Quality of Service aware secure data transmission model for Internet of Things assisted wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 34, e4664.

    Article  Google Scholar 

  17. Jain, K., Mehra, P. S., Dwivedi, A. K., & Agarwal, A. (2022). SCADA: Scalable cluster-based data aggregation technique for improving network lifetime of wireless sensor networks. The Journal of Supercomputing, 78, 1–29.

    Article  Google Scholar 

  18. Rezaeipour, K. H., & Barati, H. (2022). A hierarchical key management method for wireless sensor networks. Microprocessors and Microsystems, 90, 104489.

    Article  Google Scholar 

  19. Gupta, A., Tripathi, M., & Sharma, A. (2020). A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN. Computer Communications, 160, 311–325.

    Article  Google Scholar 

  20. Gope, P. (2020). PMAKE: Privacy-aware multi-factor authenticated key establishment scheme for advance metering infrastructure in smart grid. Computer Communications, 152, 338–344.

    Article  Google Scholar 

  21. Narwal, B., & Mohapatra, A. K. (2021). A survey on security and authentication in wireless body area networks. Journal of Systems Architecture, 113, 101883.

    Article  Google Scholar 

  22. Shen, A. N., Guo, S., & Chien, H. Y. (2009, March). An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks. In 2009 IEEE sarnoff symposium (pp. 1–5). IEEE.

  23. Kumar, K. N., & Nene, M. J. (2017, January). Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks. In 2017 international conference on inventive systems and control (ICISC) (pp. 1–6). IEEE.

  24. Mahmood, Z., Ning, H., & Ghafoor, A. (2017). A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors, 17(4), 670.

    Article  Google Scholar 

  25. Dinker, A. G., & Sharma, V. (2018). Trivariate polynomial based key management scheme (TPB-KMS) in hierarchical wireless sensor networks. In Ambient communications and computer systems: RACCCS 2017 (pp. 283–290). Springer, Singapore.

  26. Bahrami, P. N., Javadi, H. H., Dargahi, T., Dehghantanha, A., & Choo, K. K. R. (2019). A hierarchical key pre-distribution scheme for fog networks. Concurrency and Computation: Practice and Experience, 31(22), e4776.

    Article  Google Scholar 

  27. Albakri, A., Maddumala, M., & Harn, L. (2018). Hierarchical polynomial-based key management scheme in fog computing. In 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp. 1593–1597). IEEE.

  28. Hamsha, K., & Nagaraja, G. S. (2019). Threshold cryptography based light weight key management technique for hierarchical WSNs. In Ubiquitous communications and network computing: Second EAI international conference, Bangalore, India, February 8–10, 2019, Proceedings 2 (pp. 188–197). Springer International Publishing.

  29. Kumar, A., Bansal, N., & Pais, A. R. (2019). New key pre-distribution scheme based on combinatorial design for wireless sensor networks. IET Communications, 13(7), 892–897.

    Article  Google Scholar 

  30. NS2.35 Accessed on 23 March 2022- https://www.nsnam.com/2020/06/installation-of-ns2-ns-235-in-ubuntu.html

  31. Ullah, A., Azeem, M., Ashraf, H., Jhanjhi, N. Z., Nkenyereye, L., & Humayun, M. (2021). Secure critical data reclamation scheme for isolated clusters in IoT-enabled WSN. IEEE Internet of Things Journal, 9(4), 2669–2677.

    Article  Google Scholar 

  32. Daghighi, B., Mat Kiah, M. L., Iqbal, S., Rehman, M. H. U., & Martin, K. (2018). Host mobility key management in dynamic secure group communication. Wireless Networks, 24(8), 3009–3027.

    Article  Google Scholar 

  33. Agarwal, A., Dev, A., & Jain, K. (2020). Prolonging sensor network lifetime by using energy-efficient cluster-based scheduling. International Journal of Scientific & Technology Research, ISSN, 9(4), 2277–8616.

    Google Scholar 

  34. Agarwal, A., Jain, K., & Dev, A. (2021). Modeling and analysis of data prediction technique based on linear regression model (DP-LRM) for cluster-based sensor networks. International Journal of Ambient Computing and Intelligence (IJACI), 12(4), 98–117.

    Article  Google Scholar 

Download references

Funding

No funding is received.

Author information

Authors and Affiliations

Authors

Contributions

Author 1: Akansha Singh 1. Conceived and designed the analysis 2. Collected the data 3. Contributed data or analysis tools 4. Wrote the paper Author 2: Khushboo Jain 1. Conceived and designed the analysis 2. Performed the analysis 3. Prepared the figures 4. Wrote the paper All authors reviewed the manuscript

Corresponding author

Correspondence to Khushboo Jain.

Ethics declarations

Competing interests

The authors declare no competing interests.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jain, K., Singh, A. IHKM: an improved hierarchical key management scheme for wireless sensor network. Telecommun Syst 87, 151–166 (2024). https://doi.org/10.1007/s11235-024-01182-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-024-01182-x

Keywords

Navigation