Abstract
Wireless sensor networks (WSNs) are widely acknowledged for their potential as a robust infrastructure for collecting, processing, and transmitting information. Rezaeipour & Barati proposed a hierarchical key management scheme that manages key creation, distribution, and maintenance to provide services like message confidentiality, integrity, and authenticity to wireless sensor networks. As per the assertions posited by the authors, their scheme purportedly exhibits resilience against a spectrum of potential threats. Nevertheless, upon subjecting their scheme to meticulous scrutiny, our analysis revealed vulnerabilities to manifold adversarial strategies, notably including man-in-the-middle attacks, replay attacks, impersonation attacks, and node capture attacks. This scheme fails to establish a secure session key agreement also. In response to these identified shortcomings, this research devised an “Improved Hierarchical Key Management” (IHKM) Scheme aimed at rectifying the deficiencies of Rezaeipour and Barati’s scheme (RB scheme). This work proposed an enhanced key management scheme that utilizes a blend of symmetric and asymmetric key cryptography to enhance the security parameters of Hierarchical WSNs. A comprehensive security analysis of the proposed work shows that the IHKM scheme is secure against impersonation attacks, man-in-the-middle attacks, replay attacks node capture attacks, Denial-of-Service attacks, and base station bypassing attacks while establishing the mutual key agreement between the area managers and sensor nodes. Moreover, a comparative analysis of the IHKM scheme exhibits notable reductions in energy consumption (62.27% and 49.15%) and memory utilization (39.28%, 23.36%) when compared with the RB scheme and HISCOM schemes respectively. Simultaneously, IHKM contributes to the extension of the network’s overall lifespan by 48.78% as compared to HISCOM scheme and 32.63% as compared to compared with the RB scheme, thereby enhancing the efficiency and longevity of the WSN infrastructure.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Data sharing does not apply to this article as no datasets were generated or analyzed during the current study.
References
Jain, K., Kumar, A., & Singh, A. (2022). Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022. Transactions on Emerging Telecommunications Technologies, 34, e4674.
Chan, L., Gomez Chavez, K., Rudolph, H., & Hourani, A. (2020). Hierarchical routing protocols for wireless sensor network: A compressive survey. Wireless Networks, 26(5), 3291–3314.
Agarwal, A., Jain, K., & Dev, A. (2022). BFL: A buffer based linear filtration method for data aggregation in wireless sensor networks. International Journal of Information Technology, 14(3), 1445–1454.
Singh, A., Awasthi, A. K., Singh, K., & Srivastava, P. K. (2018). Modeling and analysis of worm propagation in wireless sensor networks. Wireless Personal Communications, 98(3), 2535–2551.
Jain, K., & Kumar, A. (2021). A lightweight data transmission reduction method based on a dual prediction technique for sensor networks. Transactions on Emerging Telecommunications Technologies, 32(11), e4345.
Jia, C., Ding, H., Zhang, C., & Zhang, X. (2021). Design of a dynamic key management plan for intelligent building energy management system based on wireless sensor network and blockchain technology. Alexandria Engineering Journal, 60(1), 337–346.
Singh, A., & Jain, K. (2022). An automated lightweight key establishment method for secure communication in WSN. Wireless Personal Communications, 124, 1–21.
Yuan, E., Wang, L., Cheng, S., Ao, N., & Guo, Q. (2020). A key management scheme based on pairing-free identity based digital signature algorithm for heterogeneous wireless sensor networks. Sensors, 20(6), 1543.
Singh, A., & Jain, K. (2022). An efficient secure key establishment method in cluster-based sensor network. Telecommunication Systems, 79(1), 3–16.
Singh, A., Awasthi, A. K., & Singh, K. (2017). Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network. Wireless Personal Communications, 94(3), 1881–1898.
Singh, A., Awasthi, A. K., & Singh, K. (2016). Lightweight multilevel key management scheme for large scale wireless sensor network. In 2016 3rd international conference on computing for sustainable global development (INDIACom) (pp. 3014–3017). IEEE.
Khan, T., Singh, K., Manjul, M., Ahmad, M. N., Zain, A. M., & Ahmadian, A. (2022). A Temperature-aware trusted routing scheme for sensor networks: Security approach. Computers & Electrical Engineering, 98, 107735.
Wu, Y., Ru, Y., Lin, Z., Liu, C., Xue, T., Zhao, X., & Chen, J. (2022). Research on cyber-attacks and defensive measures of power communication network. IEEE Internet of Things Journal.
Hussein, S. M., López Ramos, J. A., & Ashir, A. M. (2022). A secure and efficient method to protect communications and energy consumption in IoT wireless sensor networks. Electronics, 11(17), 2721.
Mezrag, F., Bitam, S., & Mellouk, A. (2022). An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks. Journal of Network and Computer Applications, 200, 103282.
Velmurugadass, P., Dhanasekaran, S., Anand, S. S., & Vasudevan, V. (2022). Quality of Service aware secure data transmission model for Internet of Things assisted wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 34, e4664.
Jain, K., Mehra, P. S., Dwivedi, A. K., & Agarwal, A. (2022). SCADA: Scalable cluster-based data aggregation technique for improving network lifetime of wireless sensor networks. The Journal of Supercomputing, 78, 1–29.
Rezaeipour, K. H., & Barati, H. (2022). A hierarchical key management method for wireless sensor networks. Microprocessors and Microsystems, 90, 104489.
Gupta, A., Tripathi, M., & Sharma, A. (2020). A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN. Computer Communications, 160, 311–325.
Gope, P. (2020). PMAKE: Privacy-aware multi-factor authenticated key establishment scheme for advance metering infrastructure in smart grid. Computer Communications, 152, 338–344.
Narwal, B., & Mohapatra, A. K. (2021). A survey on security and authentication in wireless body area networks. Journal of Systems Architecture, 113, 101883.
Shen, A. N., Guo, S., & Chien, H. Y. (2009, March). An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks. In 2009 IEEE sarnoff symposium (pp. 1–5). IEEE.
Kumar, K. N., & Nene, M. J. (2017, January). Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks. In 2017 international conference on inventive systems and control (ICISC) (pp. 1–6). IEEE.
Mahmood, Z., Ning, H., & Ghafoor, A. (2017). A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors, 17(4), 670.
Dinker, A. G., & Sharma, V. (2018). Trivariate polynomial based key management scheme (TPB-KMS) in hierarchical wireless sensor networks. In Ambient communications and computer systems: RACCCS 2017 (pp. 283–290). Springer, Singapore.
Bahrami, P. N., Javadi, H. H., Dargahi, T., Dehghantanha, A., & Choo, K. K. R. (2019). A hierarchical key pre-distribution scheme for fog networks. Concurrency and Computation: Practice and Experience, 31(22), e4776.
Albakri, A., Maddumala, M., & Harn, L. (2018). Hierarchical polynomial-based key management scheme in fog computing. In 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp. 1593–1597). IEEE.
Hamsha, K., & Nagaraja, G. S. (2019). Threshold cryptography based light weight key management technique for hierarchical WSNs. In Ubiquitous communications and network computing: Second EAI international conference, Bangalore, India, February 8–10, 2019, Proceedings 2 (pp. 188–197). Springer International Publishing.
Kumar, A., Bansal, N., & Pais, A. R. (2019). New key pre-distribution scheme based on combinatorial design for wireless sensor networks. IET Communications, 13(7), 892–897.
NS2.35 Accessed on 23 March 2022- https://www.nsnam.com/2020/06/installation-of-ns2-ns-235-in-ubuntu.html
Ullah, A., Azeem, M., Ashraf, H., Jhanjhi, N. Z., Nkenyereye, L., & Humayun, M. (2021). Secure critical data reclamation scheme for isolated clusters in IoT-enabled WSN. IEEE Internet of Things Journal, 9(4), 2669–2677.
Daghighi, B., Mat Kiah, M. L., Iqbal, S., Rehman, M. H. U., & Martin, K. (2018). Host mobility key management in dynamic secure group communication. Wireless Networks, 24(8), 3009–3027.
Agarwal, A., Dev, A., & Jain, K. (2020). Prolonging sensor network lifetime by using energy-efficient cluster-based scheduling. International Journal of Scientific & Technology Research, ISSN, 9(4), 2277–8616.
Agarwal, A., Jain, K., & Dev, A. (2021). Modeling and analysis of data prediction technique based on linear regression model (DP-LRM) for cluster-based sensor networks. International Journal of Ambient Computing and Intelligence (IJACI), 12(4), 98–117.
Funding
No funding is received.
Author information
Authors and Affiliations
Contributions
Author 1: Akansha Singh 1. Conceived and designed the analysis 2. Collected the data 3. Contributed data or analysis tools 4. Wrote the paper Author 2: Khushboo Jain 1. Conceived and designed the analysis 2. Performed the analysis 3. Prepared the figures 4. Wrote the paper All authors reviewed the manuscript
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jain, K., Singh, A. IHKM: an improved hierarchical key management scheme for wireless sensor network. Telecommun Syst 87, 151–166 (2024). https://doi.org/10.1007/s11235-024-01182-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-024-01182-x