Open Access Open Access  Restricted Access Subscription Access

A Review of Efficient Dynamic Key Management Scheme for Heterogeneous Wireless Sensor Networks


Affiliations
1 ARIS, SKUAST-Kashmir, Srinagar, J&K, 190025, India
2 College of Agri. Engineering., SKUAST-Kashmir, Srinagar, J&K, 190025, India
3 Department of Computer Sc., ICSC, University of Kashmir, Srinagar, J&K,190006, India
 

Security has been one of the most critical concerns for wireless sensor network (WSN) systems in recent years. Application of WSN has faced criticism in several fields due to limited flexibility and security in the long term. This study aimed at reviewing the dynamic key management schemes for Heterogenous WSN systems to determine efficient management schemes. Applicability of notable schemes such as Basic scheme, and hybrid schemes under dynamic key management depends majorly on the central key controller presence.

Keywords

Dynamic Key Management, Distributed Schemes; Heterogenous Wireless Sensor Networks System
User
Notifications
Font Size

  • S. Seo, J. Won, S. Sultana, and E. Bertino, “Effective Key Management in Dynamic Wireless sensor networks,” Cyber Cent. Publ., vol. 10, no. 2, pp. 371–383, 2015.
  • A. S. K. Pathan, C. S. Hong, and H. W. Lee, “Smartening the environment using wireless sensor networks in a developing country,” in 8th International Conference Advanced Communication Technology, ICACT 2006 Proceedings, 2006, vol. 1, pp. 705–709, doi: 10.1109/icact.2006.206063.
  • U. B. Desai, B. N. Jain, and S. N. Merchant, “Wireless Sensor Networks : Technology Roadmap,” 2007. [Online]. Available: http:// citeseerx.ist.psu.edu/viewdoc/download?doi= 10.1.1.458.8531&rep=rep1&type=pdf.
  • H.-W. Lee, C. S. Hong, and A.-S. K. Pathan, “Security in Wireless Sensor Networks: Issues and Challenges,” 2006.
  • T. Zia and A. Zomaya, “Security Issues in Wireless Sensor Networks,” 2006.
  • V. Kumar, A. Jain, and P. Barwal, “Wireless Sensor Networks: Security Issues, Challenges and Solutions,” Int. J. Inf. Comput. Technol., vol.4, no. 8, pp. 859–868, 2014.
  • E. Bai and X. Jiang, “A dynamic key management scheme based on double key for wireless sensor networks,” Telkomnika, vol. 11, no. 3, pp. 1514–1523, 2013.
  • S. Athmani, A. Bilami, and D. E. Boubiche, “EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs,” Futur. Gener. Comput. Syst., 2017, doi: 10.1016/j.future.2017.10.026.
  • X. He, M. Niedermeier, and H. De Meer, “Dynamic key management in wireless sensor networks: A survey,” J. Netw. Comput. Appl., vol. 36, no. 2, pp. 611–622, 2012, doi: 10.1016/j.jnca.2012.12.010.
  • S. H. Erfani, H. H. S. Javadi, and A. M. Rahmani, “A dynamic key management scheme for dynamic wireless sensor networks,” Secur. Commun. Networks, vol. 8, no. 6, pp. 1040– 1049, 2015, doi: 10.1002/sec.1058.
  • C. M. Chen, X. Zheng, and T. Y. Wu, “A complete hierarchical key management scheme for heterogeneous wireless sensor networks,” Sci. World J., vol. 2014, 2014, doi: 10.1155/2014/816549.
  • A. Pattanaik and B. Majhi, “Weakness of Key Predistribution Scheme Proposed by J. Dong et al,” IACR Cryptol, vol. 114, no. ePrint Arch., 2009.
  • D. E. Boubiche, S. Athmani, S. Boubiche, and H. Toral-Cruz, “Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions,” Wirel. Pers. Commun., 2020, doi: https://doi.org/10.1007/s11277-020-07213-5.
  • K. Kifayat, M. Merabti, Q. Shi, and D. LlewellynJones, Security in Wireless Sensor Networks. Berlin: Springer, 2010.
  • E. Walid, T. Newe, M. Fraifer, and E. O’Connell, “Implementing Secure Key Coordination Scheme for Line Topology Wireless Sensor Networks,” in Advances in Security in Computing and Communications, 2017.
  • S. A. Camtepe and B. Yener, “Key management in wireless sensor networks,” Inf. Secur. J., 2008, doi: 10.1080/19393555.2019.1628326.
  • M. R. Alagheband and M. R. Aref, “A secure key management framework for heterogeneous wireless sensor networks,” vol. 7025 LNCS, pp. 18–31, 2011, doi: 10.1007/978-3-642-247125_2.
  • R. K. Kodali, S. Chougule, and A. Agarwal, “Key management technique for heterogeneous wireless sensor networks,” IEEE 2013 Tencon - Spring, TENCONSpring 2013 Conf. Proc., pp. 183–187, 2013, doi: 10.1109/ TENCONSpring.2013.6584437.
  • A. S. Elqusy, S. E. Essa, and A. El-Sayed, “A Key Management Techniques in Wireless Sensor Networks,” Commun. Appl. Electron., vol. 7, no. 2, pp. 8–18, 2017, doi: 10.5120/ cae2017652600.
  • S. V. Manikanthan and T. Padmapriya, “A secured multi-level key management technique for intensified wireless sensor network,” Int. J. Recent Technol. Eng., vol. 7, no. 6, pp. 544–551, 2019.
  • E. Yuan, L. Wang, S. Cheng, N. Ao, and Q. Guo, “A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks,” Sensors, 2020.
  • A. B. Kalyani, “Heterogeneous Network Framework Architecture – A Survey,” Int. J. Comput. Sci. Inf. Technol. Secur., vol. 2, no. 4, pp. 869–874, 2012.
  • G. Wagenknecht, M. Anwander, T. Braun, T. Staub, J. Matheka, and S. Morgenthaler, “MARWIS: A management architecture for heterogeneous wireless sensor networks,” vol. 5031 LNCS, no. January, pp. 177–188, 2008, doi: 10.1007/978-3-540-68807-5_15.
  • M. R. Dhage and S. Vemuru, “Routing design issues in heterogeneous wireless sensor network,” Int. J. Electr. Comput. Eng., vol. 8, no. 2, pp. 1028–1039, 2018, doi: 10.11591/ijece.v8i2.pp1028-1039.
  • M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh, “Exploiting heterogeneity in sensor networks,” in Proceedings - IEEE INFOCOM, 2005, vol. 2, pp. 878–890, doi: 10.1109/infcom.2005.1498318.
  • J. J. Lee, B. Krishnamachari, and C. C. J. Kuo, “Impact of heterogeneous deployment on lifetime sensing coverage in sensor networks,” in 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, 2004, no. March 2016, pp. 367–376, doi: 10.1109/sahcn.2004.1381938.
  • S. Mahajan and J. Malhotra, “Energy Efficient Control Strategies in Heterogeneous Wireless Sensor Networks: A Survey,” Int. J. Comput. Appl., vol. 14, no. 6, pp. 31–37, 2011, doi: 10.5120/1886-2503.
  • Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management schemes in wireless sensor networks,” Comput. Commun., vol. 30, no. 11–12, pp. 2314–2341, 2007, doi: 10.1016/j.comcom.2007.04.009.
  • P. Ahlawat, “Key Distribution and Management in WSN Security: A State of the Art,” Int. J. Innov. Technol. Explor. Eng., vol. 9, no. 2S, pp. 462– 472, 2019, doi: 10.35940/ijitee.b1118.1292s19.
  • W. Z. Khan, N. M. Saad, and M. Y. Aalsalem, “An overview of evaluation metrics for routing protocols in wireless sensor networks,” in ICIAS 2012 - 2012 4th International Conference on Intelligent and Advanced Systems: A Conference of World Engineering, Science and Technology Congress (ESTCON) - Conference Proceedings, 2012, vol. 2, pp. 588–593, doi: 10.1109/ICIAS.2012.6306083.
  • S. R. Nabavi and S. M. Mousavi, “A Review of Distributed Dynamic Key Management Schemes in Wireless Sensor Networks,” J. Comput., vol. 13, no. 1, pp. 77–89, 2018, doi: 10.17706/jcp.13.1.77-89.
  • R. Divya and T.Thirumurugan, “A Novel Dynamic Key Management Scheme Based On Hamming Distance for Wireless Sensor Networks,” Int. J. Sci. Eng. Res., vol. 2, no. 5, 2011.
  • M. Eltoweissy, M. Moharrum, and R. Mukkamala, “Dynamic key management in sensor networks,” IEEE Commun. Mag., vol. 44, no. 4, pp. 122– 130, 2006, doi: 10.1109/MCOM.2006.1632659.
  • X. Du, Y. Xiao, M. Guizani, and H. H. Chen, “An effective key management scheme for heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24–34, 2007, doi: 10.1016/j.adhoc.2006.05.012.
  • N. Nisha and M. Dave, “Storage as a parameter for classifying dynamic key management schemes proposed for WSNs,” in 2016 International Conference on Computational Techniques in Information and Communication Technologies, ICCTICT 2016 - Proceedings, 2016, pp. 51–56, doi: 10.1109/ICCTICT.2016.7514551.
  • A. K. Gautam and R. Kumar, “A comparative study of recently proposed key management schemes in wireless sensor network,” in 2018 International Conference on Computing, Power and Communication Technologies, GUCON 2018, 2018, pp. 512–517, doi: 10.1109/ GUCON.2018.8674948.
  • R. Jiang, J. Luo, F. Tu, and J. Zhong, “LEP: A lightweight key management scheme based on ebs and polynomial for wireless sensor networks,” in 2011 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2011, 2011, no. December, doi: 10.1109/ICSPCC.2011.6061682.
  • X. Zhang, J. He, and Q. Wei, “EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks,” Eurasip J. Wirel. Commun. Netw., vol. 2011, 2011, doi: 10.1155/2011/765143.
  • R. Seetha and S. Ramakrishnan, “A Survey on Group Key Management Schemes,” Cybern. Inf. Technol., vol. 15, no. 3, 2015.
  • C. L. Wang, T. P. Hong, G. Horng, and W. H. Wang, “A ga-based key-management scheme
  • in hierarchical wireless sensor networks,” Int. J. Innov. Comput. Inf. Control, vol. 5, no. 12, pp. 4693–4702, 2009.
  • M. H. Eldefrawy, M. K. Khan, and K. Alghathbar, “A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography,” Proc. - 2010 Int. Conf. Anti-Counterfeiting, Secur. Identification, 2010 ASID, pp. 1–6, 2010, doi: 10.1109/ICASID.2010.5551480.
  • I. E. Liao, J. Y. Huang, and H. W. Tang, “A forward authentication key management scheme for heterogeneous sensor networks,” Eurasip J. Wirel. Commun. Netw., vol. 2011, 2011, doi: 10.1155/2011/296704.
  • W. Tiberti, F. Caruso, and L. Pomante, “Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks,” Int. J. Distrib. Sens. Networks, vol. 16, no. 10, 2020.
  • R. Shaik and S. S. Ahamad, “Key management schemes of wireless sensor networks -a survey,” Fronteiras, vol. 6, no. 2, pp. 526–537, 2017, doi: 10.21664/2238-8869.2017v6i2. p526-537.

Abstract Views: 223

PDF Views: 2




  • A Review of Efficient Dynamic Key Management Scheme for Heterogeneous Wireless Sensor Networks

Abstract Views: 223  |  PDF Views: 2

Authors

Itfaq Ahmad Mir
ARIS, SKUAST-Kashmir, Srinagar, J&K, 190025, India
G. M. Mir
College of Agri. Engineering., SKUAST-Kashmir, Srinagar, J&K, 190025, India
Mudasir Ahmad Makhdoomi
Department of Computer Sc., ICSC, University of Kashmir, Srinagar, J&K,190006, India

Abstract


Security has been one of the most critical concerns for wireless sensor network (WSN) systems in recent years. Application of WSN has faced criticism in several fields due to limited flexibility and security in the long term. This study aimed at reviewing the dynamic key management schemes for Heterogenous WSN systems to determine efficient management schemes. Applicability of notable schemes such as Basic scheme, and hybrid schemes under dynamic key management depends majorly on the central key controller presence.

Keywords


Dynamic Key Management, Distributed Schemes; Heterogenous Wireless Sensor Networks System

References





DOI: https://doi.org/10.13005/ojcst13.0203.01