Next Article in Journal
Comparative Analysis of Edge Detection Operators Using a Threshold Estimation Approach on Medical Noisy Images with Different Complexities
Next Article in Special Issue
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
Previous Article in Journal
An Improved Method for Enhancing the Accuracy and Speed of Dynamic Object Detection Based on YOLOv8s
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks

1
Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien 974301, Taiwan
2
School of Information Science and Technology, Guangdong University of Foreign Studies, Guangzhou 510420, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(1), 86; https://doi.org/10.3390/s25010086
Submission received: 18 November 2024 / Revised: 16 December 2024 / Accepted: 25 December 2024 / Published: 26 December 2024
(This article belongs to the Special Issue Security, Privacy and Trust in Wireless Sensor Networks)

Abstract

:
The major task of a wireless sensor network (WSN) is data collection. Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. Most research on KP-like schemes is dedicated to enhancing resiliency against node capture attack (NA) and retaining the link connectivity in the meantime. For large-scale wireless sensor networks, a more common approach is to use a multiple-sink WSN (MWSN) to support a large number of sensor nodes. In MWSNs, there are different clusters (referred to as groups). We took the lead in studying KP in the MWSN environment. Based on the new MWSN environment, we present intragroup and intergroup KP (I2KP) to fulfill both requirements of security and energy efficiency when gathering data via various sink nodes in a large-scale WSN. Three types of I2KP with respective pros and cons are proposed. Theoretical analysis and numerical simulation demonstrate their effectiveness.

1. Introduction

A wireless sensor network (WSN) is a low-cost, short-distance, and easy-to-deploy wireless network architecture that is widely used in in various applications. For example, it can be applied to agricultural environments, smart metering in power transmission systems, and the Internet of Things [1,2,3,4]. The above applications basically require secure communication. Furthermore, security issues will become even more important if a WSN is deployed for certain mission-critical applications. Therefore, secure links must be established between sensor nodes to ensure data security and privacy in wireless sensor networks. In general, there are two types of key management protocols to secure communications in WSNs. One is pairwise key distribution to share a pairwise key between two sensor nodes [5,6,7,8,9,10,11,12,13,14,15], and the other is group key distribution to share a conference key for the sensor nodes in group communication [16,17,18]. As introduced in [5], key predistribution (KP) is firstly proposed for sharing a pairwise key between two neighbored nodes, where each node is pre-loaded with several keys selected from a key pool. There are two types of KP approaches: one is the random KP (RKP) [5,10,11,15] and the other is the deterministic KP (DKP) [8,9,14]. Generally, RKP uses light-weight cryptography, but DKP guarantees connectivity. Hybrid schemes [19] combined with RKP and DKP have both deterministic and probabilistic properties.
To enhance resiliency against node capture attacks (NAs), during which attackers capture and compromise nodes to collect keys for eavesdropping on communications among other uncompromised nodes, q-composite KP and hash chain-based KP (HKP) were accordingly proposed to resist NAs. However, these two approaches have their pros and cons. q-composite KP [12,13] does not need hash operation but reduces connectivity. On the other hand, HKP [6,7] retains the link connectivity, while it needs extra hash operations. Another approach to enhance NA resistance is unbalanced KP [15], which employs sensor nodes with different keyring sizes.
Because sensor nodes have a power limit constraint, it is a critical issue to save energy consumption in WSNs. This situation becomes more serious for a large-scale sensor network. One possible approach to reducing energy consumption is to deploy a multiple-sink WSN (MWSN) [20,21,22,23,24,25], for which most researchers adopt computation and topology techniques to improve connectivity between sensor nodes and sink nodes for energy reduction. In this paper, we study pairwise key predistribution in the MWSN environment to establish a short path collecting data via various sink nodes to improve energy efficiency in a large-scale WSN. The motivation of studying pairwise key predistribution in MWSNs will be further described in Section 3. Based on the new MWSN environment, where there are different clusters (groups), we formally define intragroup and intergroup conditions for our intragroup and intergroup key predistribution (I2KP). Three I2KP schemes are proposed, and each has its own advantages. The rest of this paper is organized as follows. Section 2 briefly reviews KP and HKP. In Section 3, the research motivation is described. Also, intragroup and intergroup conditions are defined. Three types of I2KP satisfying intragroup and intergroup conditions are proposed in Section 4. Comparisons and numerical simulations are given in Section 5 to show their pros and cons. A conclusion is drawn in Section 6.

2. Previous Works

2.1. Hash Chain

The one-way hash chain is an important cryptographic technology based on the hash function and can be used in many security applications. A hash function has the one-way property, which can undergo a collision attack and a preimage attack. Let the notation h i ( x ) = h ( h ( h ( x ) ) ) h a s h   i   t i m e s denote applying the hash function “i” times. We can create an L-length hash chain ( h 0 ( x ) ,   h 1 ( x ) ,   ,   h L 1 ( x ) ) , where h i ( x ) = h ( h i 1 ( x ) ) for 1 ≤ i ≤ (L − 1) and h 0 ( x ) = x . Suppose the two hash indices are i 1 and i 2 ( i 1 < i 2 ); one can perform the h(·) function ( i 2 i 1 ) times to obtain h i 2 ( x ) from h i 1 ( x ) via h i 2 i 1 ( h i 1 ( x ) ) = h i 2 ( x ) . Obviously, we cannot compute the hash chain backwards, i.e., h i 2 ( x ) h i 1 ( x ) .

2.2. KP and HKP

KP is a probabilistic scheme [5,10,11,15]. Each sensor is pre-loaded with m keys, where m is the key ring size. These keys are randomly selected from a key pool S with a size of | S | . The notions of various key predistribution schemes (HKP [6], HKP using a key-chain length L [7], q-composite KP [12,13], q-composite HKP (a hybrid of q-composite and HKP)) are briefly described as follows. q-composite KP establishes a secure link with at least q common keys between two neighboring nodes, and the q-composite KP with q = 1 is reduced as the conventional KP. Obviously, the large value of q more effectively resists NAs, but the link connectivity is reduced. Another way for improving NA resiliency is HKP. Each sensor node stores the hash key h i ( x ) , where i is the node ID, unlike the KP that stores the raw key. HKP has the same link connectivity as KP, but it needs extra hash operations. This is because any two nodes (say node #a and node #b) storing h i a ( x ) and h i b ( x ) , where i a < i b , may share a secret key h i b ( x ) . For this case, node #b uses its hashed key h i b ( x ) , while node #a obtains h i b ( x ) from its hashed key h i a ( x ) by using h ( i b i a ) ( h i a ( k ) ) = h i b ( k ) . Meantime, HKP can improve NA resiliency. Suppose a captured node #c has a hashed key h i c ( x ) in its key ring and that the hash index i c is greater than i b . If node #c is compromised, the hashed key h i c ( k ) cannot be used to eavesdrop in the link between nodes #a and #bc because attackers cannot compute h i b ( k ) backward from h i c ( k ) . To further enhance NA resiliency, HKP using a parameter key-chain length L is introduced. Namely, we can store the hashed key in h i ( k ) , where 0 ≤ i ≤ (L − 1), for a sensor node according to its node ID (mod L). When the key-chain length L is used, the number of hash operations is limited to L, thereby reducing the computational complexity.
Next, we use an example including six sensor nodes with IDs #7, #8, #9, #12, #14, and #27 to briefly describe q-composite KP and HKP. As illustrated in Figure 1, the key ring size is m = 4. Figure 1a is single-composite KP (q = 1). There are four links with q ≥ 1 for any two neighbor nodes: ( # 7 # 8 ) , ( # 9 # 12 ) , ( # 7 # 27 ) , and ( # 14 # 27 ) . For example, nodes #14 and #27 have the same two keys (k2 and k3) in their key rings. Since q = 1, these two nodes can use any one key (k2 or k3) to establish a secure link. Consider the case q = 2 (dual-composite KP). Two nodes need q′ ≥ 2 keys (say k 1 ,   k 2 ,   ,   k q ) to establish a secure link. For dual-composite KP, only one link ( # 14 # 27 ) with a hybrid of k 2 and k 3 (for example, using a hashed key f ( k 2 | | k 3 ) ) can be established. The large q enhances NA resiliency because attackers need more captured keys to obtain the hashed keys. However, this is also the reason that the connectivity is reduced, because the link is established by q keys. For the single-composite scheme in Figure 1a, when node #12 is captured, attackers having k 9 can compromise the link ( # 7 # 8 ) . But, for the case q = 2, attackers cannot compromise this link because this link ( # 7 # 8 ) cannot be established.
q-composite HKP is q-composite KP but storing the hashed keys in a key ring. Figure 1b is single-composite HKP. Similarly to single-composite KP in Figure 1a, all the secure links for ( # 7 # 8 ) , ( # 9 # 12 ) , ( # 7 # 27 ) , and ( # 14 # 27 ) can be established by using hashed keys instead of raw keys. For example, the link ( # 7 # 27 ) in Figure 1a uses the raw key k 2 , but the link ( # 7 # 27 ) in Figure 1b uses the hashed key h 27 ( k 2 ) . It is observed that the connectivity of single-composite HKP is not reduced, but node #7 needs extra 20 hash operations to obtain h 27 ( k 2 ) from h 7 ( k 2 ) . The NA resiliency of single-composite HKP is enhanced. For example, in Figure 1b, the hashed key h 12 ( k 9 ) in the captured node #12 cannot be used to compromise the link ( # 7 # 8 ) using h 8 ( k 9 ) since attackers cannot backward- compute the hash chain. As described above, q-composite HKP needs hash operations between two nodes #i and #j to share a common key. Thus, the large scale of the WSN results in heavy computation overhead. To reduce hash operations, a parameter key-chain length L is introduced. The hashed keys h i ( k ) and h j ( k ) in nodes #i and #j are replaced by h i ( mod   L ) ( k ) and h j ( mod   L ) ( k ) . Finally, the number of required hash operations | i ( mod   L ) j ( mod   L ) | for establishing a pairwise key is reduced and bounded by L. Single-composite HCKP using L = 10 is shown in Figure 1c, in which both nodes #7 and #27 use the hashed key h 7 ( k 2 ) to establish a secure link. Compared with Figure 1b, using L = 10 does not need extra hash operations for the link ( # 7 # 27 ) . Although using L reduces hash operations, its resiliency against NAs is also degraded. We use the following case to show this reduction in resiliency. As shown in Figure 1c, the attacker can capture node #12 with h 2 ( k 9 ) to obtain h 8 ( k 9 ) and then compromise the link ( # 7 # 8 ) using the hashed key h 8 ( k 9 ) . However, in Figure 1b, the attacker captures node #12 but cannot compromise the link ( # 7 # 8 ) because he cannot obtain h 8 ( k 9 ) from h 12 ( k 9 ) .

3. Motivation

Due to the power limit constraint of sensors, it is a critical issue to save energy consumption in WSNs, especially in a large-scale sensor network. One possible solution for reducing energy consumption and, in the meantime, maintaining performance with the increment in sensor nodes is to deploy a multiple-sink WSN (MWSN) [20,21,22,23,24,25]. The above implies that the MWSN approach could deal with concerns about “energy consumption” and “increment of sensor nodes” in WSNs. This motivates us to study secure communications in MWSNs.
An MWSN includes a number of clusters (groups) with a sink node for each group. As illustrated in Figure 2, there are six groups A~F in this MWSN.
The sensor nodes in a group can gather data and send them back to the backend database via a sink node in its group. In this paper, we study KP in an MWSN environment. We first consider an intragroup case with all the nodes in a group (say group A). Suppose any two neighbor nodes in the following links, ( # 3 1 # 10 S ) , ( # 5 # 8 S ) , and ( # 7 # 11 # 8 S ) , have a common key; then, nodes #3, #5, and #7 can gather data and send them back to the sink node through these secure links, respectively. It is observed that nodes #5 and #11 are in two intersecting groups (A and B) and (A and C), and the node #7 is in three intersecting groups (A, B, and C). The nodes in intersecting groups can connect with nodes in different groups. For example, node #5 can send data back through the sink node in group B. Next, we discuss the intergroup case. The nodes in different groups which are not located in intersecting areas have no same key in their key rings. Thus, they cannot establish a secure link. For example, the following could not establish secure links: node #2 in group A and node #6 in group B (#2Sensors 25 00086 i001#6), node #4 in group B and node #13 in group D (#4Sensors 25 00086 i001#13), and node #12 in group E and node #9 in group F (#12Sensors 25 00086 i001#9). The reason we do not let the nodes in two groups establish secure links is to control the stream flow diversion from data collection for saving on energy consumption.
Based on the above observations, we formally define intragroup and intergroup conditions when dealing with I2KP in an MWSN environment.
(1)
Intragroup condition: The nodes in each group with a common sink node have a pairwise key predistribution ability like in KP. The nodes located in more intersecting groups have the highest probability to establish secure links with other neighboring nodes in the whole MWSN.
(2)
Intergroup condition: The nodes in different groups are disjointed pairwise for the key ring, and, thus, they do not have the same keys to establish secure links.
Condition (1) lets the node pairwisely share a common key between two neighbor nodes to gather data and send them back via the sink node within one group. If the nodes are in intersecting groups, the secure links and the sink nodes may be more than one. This condition assures I2KP has the capability of using multiple sink nodes to gather data. For this case, the nodes in intersecting groups could have different path selections (it has higher connectivity than others that are not in intersecting groups) to pass collected data via various sink nodes, and we can use path switching to improve energy efficiency. Regarding condition (2), node #2 in group A and node #6 in group C are in different groups (see Figure 2). Thus, nodes #2 and #6 are not in intersected groups and are disjointed pairwise for the key ring. Generally, the nodes in two pairwise-disjointed areas for the key ring are some distance away. If they cannot establish a link, we have a short path selection to improve energy efficiency. The above motivates us to study I2KP for large-scale MWSNs.

4. The Proposed I2KP

Three types of I2KP are designed. The first is I2KP using different key pools (I2KPDP). I2KPDP is a trivial way to use conventional pairwise key predistribution for each group. However, the key ring size will be expanded for the nodes in intersecting groups. To reduce the key ring size of the sensor node, I2KP using the same key pool for all groups (I2KPSP) is proposed. I2KPDP and I2KPSP cannot resist a location-based NA (LNA). Attackers may know which nodes belong to which group from their locations. If an attacker has knowledge of the geometric locations of sensor nodes, he may intentionally capture the nodes in intersected groups to aggravate the NA. Both I2KPDP and I2KPSP suffer from this LNA. We design I2KP using a hash chain (I2KPHC) to effectively tackle LNAs.

4.1. The Proposed I2KPDP

We propose I2KPDP by using different a key pool for each group. Figure 3 illustrates an example of three groups, A, B, and C. Suppose that the number of all possible key rings of size m x selected from a key pool S x of size | S x | with no identical keys in the key rings, where x∈{A, B, C}, i.e., S A S B = ϕ , S A S C = ϕ , and S B S C = ϕ . The key selection rules for I2KPDP are described below. For a node in group x, m x keys are randomly selected from the key pool S x . Thus, if the node is in the group ( x y ) , there are a total of ( m x + m y ) keys in its key ring. Obviously, the node in the group ( x y z ) will have ( m x + m y + m z ) keys. For simplicity, we use m = m x = m y = m z and | S | = | S x | = | S y | = | S z | to describe I2KPDP. Seven disjointed areas Ai, 1 ≤ i ≤ 7, with a size of | A i | = n i in Figure 3 are represented in Equation (1). Finally, nodes #5, #6, and #7 in areas A5, A6, and A7 have a key ring size of m. Nodes #2, #3, and #4 in areas A2, A3, and A4 have a key ring size of 2m, while node #1 in the A1 area has a key ring size of 3m.
A 1 = ( A B C ) ;   A 2 = ( A B ) ( A B C ) ;   A 3 = ( A C ) ( A B C ) A 4 = ( B C ) ( A B C ) ;   A 5 = A ( A B ) ( A C ) + ( A B C ) A 6 = B ( A B ) ( B C ) + ( A B C ) ;   A 7 = C ( A C ) ( B C ) + ( A B C )
Via [6,7], we could derive Equation (2) expressing the probability that any two nodes in the network group x ∈{A, B, C} share exactly l independent keys from the key pool S x , where | S x | = | S | .
P S h a r e ( x ) ( l ) = | S | l | S | l 2 ( m l ) 2 ( m l ) m l / | S | m 2
Let P S h a r e ( x y ) ( l ) be the probability that any two nodes in ( x y ) share exactly l independent keys and P S h a r e ( x y z ) ( l ) be the probability that any two nodes in ( x y z ) share exactly l independent keys. Based on Equation (2), P S h a r e ( x y ) ( l ) and P S h a r e ( x y z ) ( l ) are derived in Equation (3), where P S h a r e ( x ) ( l ) = P S h a r e ( y ) ( l ) = P S h a r e ( z ) ( l ) .
P S h a r e ( x y ) ( l ) = 0 l 1 ,   l 2 l   and   l 1 + l 2 = l P S h a r e ( x ) ( l 1 ) + P S h a r e ( y ) ( l 2 ) P S h a r e ( x y z ) ( l ) = 0 l 1 ,   l 2 ,   l 3 l   and   l 1 + l 2 + l 3 = l P S h a r e ( x ) ( l 1 ) + P S h a r e ( y ) ( l 2 ) + P S h a r e ( z ) ( l 3 )
Obviously, any two nodes in x, ( x y ) , and ( x y z ) may share the common keys from the key pools S x , ( S x S y ) , and ( S x S y S z ) , respectively. The following shows how any two nodes in the whole group G = A B C share the common keys. However, if one node is in x and the other node is in ( x y ) , they could only use the common key pool S x . Figure 4 shows the cases between subgroups in group A.
The links ( # 5 # 1 ) , ( # 5 # 2 ) , ( # 5 # 3 ) , and ( # 2 # 3 ) use the keys from S A , while the links ( # 1 # 2 ) and ( # 1 # 3 ) use the keys from ( S A S B ) and ( S A S C ) , respectively. Because we use the condition m = m x = m y = m z and | S | = | S x | = | S y | = | S z | , we have P S h a r e ( x ) ( l ) = P S h a r e ( y ) ( l )   = P S h a r e ( z ) ( l ) and P S h a r e ( x y ) ( l ) = P S h a r e ( y z ) ( l ) = P S h a r e ( x z ) ( l ) . To more simply denote the probabilities, we use P S h a r e ( 1 ) ( l ) , P S h a r e ( 2 ) ( l ) , and P S h a r e ( 3 ) ( l ) to represent the probabilities for single-intersected, double-intersected and triple-intersected groups, respectively (note: P S h a r e ( 1 ) ( l ) is the same as that in the conventional KP). The probabilities P S h a r e ( A ) ( l ) , P S h a r e ( B ) ( l ) , and P S h a r e ( C ) ( l ) using the keys from S A , S B , and S C , respectively, share exactly l independent keys for I2KPDP as derived in Lemma 1.
Lemma 1.
The intragroup probabilities  P S h a r e ( A ) ( l ) , P S h a r e ( B ) ( l ) , and P S h a r e ( C ) ( l )  for I2KPDP, as shown in Figure 2, are derived in Equations (4), (5), and (6), respectively.
Proof. 
As illustrated in Figure 3, we consider that one node i in A 1 , A 2 , A 3 , and A 5 (note: A = A 1 A 2   A 3 A 5 ), respectively, and one node j in A to communicate with each other (see Figure 4). All the possible choices of nodes i and j in A are | A | 2 = n 2 . Finally, the average probability P S h a r e ( A ) ( l ) is derived as follows.
P S h a r e ( A ) ( l ) = i A 1 j A 1 P S h a r e ( 3 ) ( l ) node   i   in   A 1   node   j   in   A 1 + i A 1 j { A 2 ,   A 3 } P S h a r e ( 2 ) ( l ) node   i   in   A 1   node   j   in   { A 2 ,   A 3 } + i A 1 j A 5 P S h a r e ( 1 ) ( l ) node   i   in   A 1   node   j   in   A 5 + i A 2 j ( A 1 A 2 ) P S h a r e ( 2 ) ( l ) node   i   in   A 2   node   j   in   ( A 1 A 2 ) + i A 2 j { A ( A 1 A 2 ) } P S h a r e ( 1 ) ( l ) node   i   in   A 2   node   j   in   A ( A 1 A 2 ) + i A 3 j ( A 1 A 3 ) P S h a r e ( 2 ) ( l ) node   i   in   A 3   node   j   in   ( A 1 A 3 ) + i A 3 j { A ( A 1 A 3 ) } P S h a r e ( 1 ) ( l ) node   i   in   A 3   node   j   in   A ( A 1 A 3 ) + i A 5 j A P S h a r e ( 1 ) ( l ) node   i   in   A 5   node   j   in   A / | A | 2 = n 5 × ( 2 n n 5 ) + 2 n 2 n 3 P S h a r e ( 1 ) ( l ) + n 2 2 + n 3 2 + 2 n 1 ( n 2 + n 3 ) P S h a r e ( 2 ) ( l ) + n 1 2 P S h a r e ( 3 ) ( l ) / n 2
By the same argument, P S h a r e ( B ) ( l ) and P S h a r e ( C ) ( l ) are derived in Equations (5) and (6).
P S h a r e ( B ) ( l ) = n 6 × ( 2 n n 6 ) + 2 n 2 n 4 P S h a r e ( 1 ) ( l ) + n 2 2 + n 4 2 + 2 n 1 ( n 2 + n 4 ) P S h a r e ( 2 ) ( l ) + n 1 2 P S h a r e ( 3 ) ( l ) / n 2
P S h a r e ( C ) ( l ) = n 7 × ( 2 n n 7 ) + 2 n 3 n 4 P S h a r e ( 1 ) ( l ) + n 3 2 + n 4 2 + 2 n 1 ( n 3 + n 4 ) P S h a r e ( 2 ) ( l ) + n 1 2 P S h a r e ( 3 ) ( l ) / n 2
Based on P S h a r e ( x ) ( l ) , the probability that two given intragroup nodes establish a secure link is P L i n k - E s t ( x ) = l = q m P S h a r e ( x ) ( l ) , where x, y, z∈{A, B, C}. Next, we prove that our I2KPDP satisfies the intragroup and intergroup conditions. □
Theorem 1.
The proposed q-composite I2KPDP in Figure 3 satisfies intragroup and intergroup conditions.
Proof. 
We first prove that q-composite I2KPDP satisfies the intragroup condition. In each group, we have the probability P L i n k - E s t ( A ) , P L i n k - E s t ( B ) , and P L i n k - E s t ( C ) to establish a secure link. The link connectivity is the same as the connection like in KP. Since the nodes in more intersecting groups have a higher probability of establishing a link, we consider the node in single-intersected (the nodes in A5, A6, and A7), double-intersected (the nodes in A2, A3, and A4), and triple-intersected (the nodes in A1) groups. Let G L i n k - A r e a ( A i G ) , where G = A B C = i = 1 7 A i , be the set of subgroups that the nodes in A i could establish a secure link with the nodes in this set. Obviously, Equation (7) implies that the nodes in more intersected groups can establish a link with more nodes in the whole group G.
G L i n k - E s t ( A 5 G ) = { A 1 ,   A 2 ,   A 3 ,   A 5 } G L i n k - E s t ( A 5 G ) = A 1 + A 2 + A 3 + A 5 G L i n k - E s t ( A 2 G ) = { A 1 ,   A 2 ,   A 3 ,   A 4 ,   A 5 ,   A 6 } G L i n k - E s t ( A 2 G ) = A 1 + A 2 + A 3 + A 4 + A 5 + A 6 G L i n k - E s t ( A 1 G ) = { A 1 ,   A 2 ,   A 3 ,   A 4 ,   A 5 ,   A 6 ,   A 7 } G L i n k - E s t ( A 1 G ) = A 1 + A 2 + A 3 + A 4 + A 5 + A 6 + A 7 G L i n k - E s t ( A 1 G ) > G L i n k - E s t ( A 2 G ) > G L i n k - E s t ( A 5 G )
Next, we prove the intergroup condition. The nodes in the two groups A and B obtain the keys from key pools S A and S B , respectively, where S A S B = ϕ . Thus, the nodes in group A and the nodes in group B cannot establish secure links except in the intersected group ( A B ) . The above implies that the proposed I2KPDP satisfies intragroup and intergroup conditions. □
The resiliency against NAs for our I2KPDP is described as follows. I2KPDP dealing with one group is reduced as in conventional KP. We first show NA resiliency for conventional KP and then give a formal analysis of our I2KPDP. Suppose that k nodes are captured in a random fashion, and the stored keys are compromised. Because each node contains m keys, the probability that a given key is uncompromised is 1 m / | S | k . On the contrary, the probability that a given key has been known is 1 1 m / | S | k . If the key of a link between two nodes is the hybrid of l shared keys, the probability of that link being compromised is 1 1 m / | S | k l . Then, the probability that any secure link between two uncompromised nodes is compromised when k nodes are captured in group x is calculated in Equation (8), which is the same as in KP [6,7].
P L i n k - C o m ( x ) = l = q m 1 1 m / | S | k l P S h a r e ( x ) ( l ) / l = q m P S h a r e ( x ) ( l )
For the proposed I2KPDP, the nodes in different areas have a different number of keys in their key rings. Thus, we should give different analyses for the probability that any secure link between two uncompromised nodes in G = ( A B C ) is compromised when k nodes are captured. For k captured nodes, it is not reasonable to consider all k captured nodes are randomly distributed in the large-scale MWSN G with many groups (say 200 groups). The case “k captured nodes” in such a large-scale G does not work for an NA, because there is a very low probability that the k captured nodes are selected from the same key pool. An NA attack does not work in this case. The following scenario about an NA in I2KPDP is more possible and reasonable. The attacker could know the nodes belonging to which group, but he does not know whether the nodes are located in intersected groups. As we know, the probability P L i n k - C o m ( x x ) of I2KPDP is the same as P L i n k - C o m ( x ) in conventional KP. Therefore, we discuss the probabilities P L i n k - C o m ( x G ) , where x∈{A, B, C}, for I2KPDP that any secure link between two uncompromised nodes is compromised in the whole group G when k nodes are captured in a random fashion in group x. All the probabilities P L i n k - C o m ( A G ) , P L i n k - C o m ( B G ) , and P L i n k - C o m ( C G ) are derived in Theorem 2. To simply represent the probabilities P L i n k - C o m ( A G ) , P L i n k - C o m ( B G ) , and P L i n k - C o m ( C G ) , assume that the intersecting group does not have many sensors (note: this is a reasonable assumption). Suppose n 1 = n 2 = n 3 = n 4 =   n / 8 , and thus we have n 5 = n 6 = n 7 = 5 n / 8 . By Equations (4)–(6), the values of P S h a r e ( A ) ( l ) = P S h a r e ( B ) ( l ) = P S h a r e ( C ) ( l ) are 57 P S h a r e ( 1 ) + 6 P S h a r e ( 2 ) + P S h a r e ( 3 ) / 64 . The result implies that we can use P S h a r e ( x ) ( l ) P S h a r e ( 1 ) to simply derive P L i n k - C o m ( x G ) , where x∈{A, B, C}.
Theorem 2.
In q-composite I2KPDP, when k nodes are captured randomly in groups A, B, and C, respectively, the probabilities  P L i n k - C o m ( A G ) , P L i n k - C o m ( B G ) , and P L i n k - C o m ( C G ) of a link being compromised are shown in Equations (9)–(11).
P L i n k - C o m ( A G ) C k n + C k n 1 + n 2 + C k n 1 + n 3 3 C k n l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
P L i n k - C o m ( B G ) C k n + C k n 1 + n 2 + C k n 1 + n 4 3 C k n l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
P L i n k - C o m ( C G ) C k n + C k n 1 + n 3 + C k n 1 + n 4 3 C k n l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
Proof. 
Suppose that k captured nodes are selected in a random fashion in group A. There are a total of C k n ways to select k captured nodes. As illustrated in Figure 3, we consider four cases: (i) all k captured nodes are in A1, and there are C k n 1 types to select k captured nodes; (ii) all k captured nodes are in A B (i.e., A 1 A 2 ), excluding case (i), and there are C k n 1 + n 2 C k n 1 types to select k captured nodes; (iii) all k captured nodes are in A C (i.e., A 1 A 3 ), excluding case (i), and there are C k n 1 + n 3 C k n 1 types to select k captured nodes; (iv) all k captured nodes are in group A, excluding cases (i), (ii), and (iii), and there are C k n C k n 1 + n 2 C k n 1 + n 3 + C k n 1 types to select k captured nodes. The total number of these cases is C k n . For case (i), the captured keys from SA, SB, and SC can be used to compromise the links in groups A, B, and C. By the same argument, when k nodes are captured for cases (ii) and (iii), the information of captured nodes can be used for compromising the links in A and B as well as A and C, respectively. The case (iv) is to compromise the links in group A excluding cases (i), (ii), and (iii). By the approximation P S h a r e ( x ) ( l ) P S h a r e ( 1 ) ( l ) and the derivation of P L i n k - C o m ( x ) in Equation (8), the probability P L i n k - C o m ( A G ) is approximately derived in Equation (12). This probability is divided by three because the size of the whole set G is about three times the size of group A, i.e., | G | 3 × | A | . By the same argument, we could derive P L i n k - C o m ( B G ) and P L i n k - C o m ( C G ) in Equations (10) and (11).
P L i n k - C o m ( A G ) 1 3 { C k n 1 C k n 3 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) case   ( i ) :   compromise   the   links   in   3   groups   A ,   B   and   C + C k n 1 + n 2 C k n 1 C k n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) case   ( ii ) :   compromise   the   links   in   2   groups   A   and   B + C k n 1 + n 3 C k n 1 C k n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) case   ( iii ) :   compromise   the   links   in   2   groups   A   and   C + C k n C k n 1 + n 2 C k n 1 + n 3 + C k n 1 C k n l = q m 1 1 m | S | k l case   ( iv ) :   compromise   the   links   in   group   A P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) ) = C k n + C k n 1 + n 2 + C k n 1 + n 3 3 C k n l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
I2KPDP that adopts different key pools for different groups increases the key ring size. Sensor nodes in the intersected groups ( x y ) and ( x y z ) must store 2m and 3m keys in the key ring, respectively. To reduce the storage sizes of sensors in intersected groups, we use the same key pool for all groups to design I2KPSP. □

4.2. The Proposed I2KPSP

The same key pool is used for all groups to reduce the key ring size. We also use three groups, A, B, and C, to describe I2KPSP (see Figure 5). For the key selection rules in I2KPSP, a nonce is randomly selected for a group. As illustrated in Figure 5, three nonces, rA, rB, and rC, and one hash function f ( ) are used in I2KPSP. For the nodes in ( x ( x y ) ( x z ) ) , where x, y, z∈{A, B, C}, if m keys (say K i ,   1 i m ) are randomly selected from key pool S, then m hashed keys ( f ( K i + r x ) ,   1 i m ) are delivered to this node. For the nodes in ( x y ) , (m + 2) values including m raw keys and two nonce ( K i ,   1 i m m   keys , r x , r y 2   nonce ) are given to the nodes, while the nodes in ( x y z ) receive (m + 3) values including m raw keys and three nonces ( K i ,   1 i m m   keys , r x , r y , r z 3   nonce ) . Finally, as shown in Figure 5, nodes #5, #6, and #7 in areas A5, A6, and A7 have a key ring of size m; nodes #2, #3, and #4 in areas A2, A3, and A4 have a ring size of (m + 2); and node #1 in area A1 has a key ring size of (m + 3). However, the key ring sizes of I2KPDP are 3m for A1 and 2m for A2, A3, and A4.
Suppose a key K I D with an identifier ID is selected from S given to a node. If node #a exists in the group ( x ( x y ) ( x z ) ) , the node will receive the hashed key f ( K I D + r x ) . Suppose another node is also in ( x ( x y ) ( x z ) ) . It may share the common key f ( K I D + r x ) with node #a if it also has the same hashed key from key pool S. Consider the case that node #b is in ( x y ) , ( x z ) , or ( x y z ) and has a key with the same identifier. It receives the raw key K I D with the nonce ( r x ,   r y ) , ( r x ,   r z ) , or ( r x ,   r y ,   r z ) . For these cases, node #b has the nonce r x , and it can calculate the hashed key f ( K I D + r x ) to share the common key with node #a. In I2KPSP, we use an extra nonce to share the pairwise key between nodes.
In the same group x, both nodes share exactly l independent keys from the key pool S that have the probability P S h a r e ( x ) ( l ) like in I2KPDP. Suppose two nodes in the intersected group ( x y ) have one same key K I D ; they could have the hashed keys f ( K I D + r x ) and f ( K I D + r y ) for establishing links. Thus, the probabilities that two nodes have exactly l independent keys in intersected groups are | S | l / 2 | S | l / 2 2 ( m l / 2 ) 2 ( m l / 2 ) m l / 2 / | S | m 2 , on which the P S h a r e ( x y ) ( l ) and P S h a r e ( x y z ) ( l ) of I2KPSP are derived in Equation (13).
P S h a r e ( x y ) ( l ) = P S h a r e ( x ) ( l / 2 ) ,   where   l   is   even P S h a r e ( x y z ) ( l ) = P S h a r e ( x ) ( l / 3 ) ,   where   l   is   a   multiple   of   3
Same as I2KPDP, we use P S h a r e ( 1 ) ( l ) , P S h a r e ( 2 ) ( l ) , and P S h a r e ( 3 ) ( l ) to represent the probabilities for single-intersected, double-intersected, and triple-intersected groups. Then, for our I2KPSP, we can get P S h a r e ( A ) ( l ) , P S h a r e ( B ) ( l ) , and P S h a r e ( C ) ( l ) using the keys from the same key pool S with different nonces x A , x B , and x C . Consider the same case n 1 = n 2 = n 3 = n 4 = n / 8 in I2KPDP. The P S h a r e ( A ) ( l ) for I2KPSP is derived in Equation (14), which is approximated to P S h a r e ( A ) ( l ) P S h a r e ( 1 ) ( l ) .
P S h a r e ( A ) ( l ) = n 5 × ( 2 n n 5 ) + 2 n 2 n 3 P S h a r e ( 1 ) ( l ) + n 2 2 + n 3 2 + 2 n 1 ( n 2 + n 3 ) P S h a r e ( 1 ) ( l / 2 ) + n 1 2 P S h a r e ( 1 ) ( l / 3 ) / n 2 = 57 P S h a r e ( 1 ) ( l ) + 6 P S h a r e ( 1 ) ( l / 2 ) + P S h a r e ( 1 ) ( l / 3 ) / 64
We can also prove that I2KPSP satisfies intragroup and intergroup conditions, and we calculate the probabilities of a link being compromised: P L i n k - C o m ( A G ) , P L i n k - C o m ( B G ) , and P L i n k - C o m ( C G ) (same as Theorem 2). Although I2KPSP does not use a hash chain, it uses a hash function f(·) to generate hashed keys in the area x ( x y ) ( x z ) . We use the approximation P S h a r e ( x ) ( l ) P S h a r e ( 1 ) ( l ) in Lemma 1, i.e., we do not consider the intersected groups P S h a r e ( 2 ) ( l ) . For n 1 = n 2 = n 3 = n 4 = n / 8 , we have P S h a r e ( x ) ( l ) = 57 P S h a r e ( 1 ) + 6 P S h a r e ( 2 ) + P S h a r e ( 3 ) / 64 . This implies the fractions of intersected groups P S h a r e ( 2 ) ( l ) and P S h a r e ( 3 ) ( l ) are very small. In fact, there is already a large portion 57 / 64 P S h a r e ( 1 ) ( l ) in Equation (14) for n 1 = n 2 = n 3 = n 4 = n / 8 , and thus we consider using P S h a r e ( 1 ) ( l ) only. Four cases using P S h a r e ( 1 ) ( l ) in group A as deriving P S h a r e ( A ) ( l ) are (i) node i in A 1 and node j in A 5 , (ii) node i in A 2 and node j in A ( A 1 A 2 ) , (iii) node i in A 3 and node j in A ( A 1 A 3 ) , and (iv) node i in A 5 and node j in A. Two hash operations are required when nodes i and j are in A 2 and A 3 , respectively. Note: even though two nodes have raw keys, we use a hashed key to establish a link for keeping consistency in the whole group. The above concludes that the average number of hash operations per node to share a common key in group A is N a v e ( A ) =   ( 2 n 5 ( n n 5 ) + 4 n 2 n 3 ) / n 2 (see Equation (15)).
N a v g ( A ) = 1 n 2 ( 1   hash   ops node   i   in   A 1   node   j   in   A 5 + 1   hash   ops i   in   A 2   j   in   A 5 + 2   hash   ops i   in   A 2   j   in   A 3 node   i   in   A 2   node   j   in   A ( A 1 A 2 ) + 1   hash   ops i   in   A 3   j   in   A 5 + 2   hash   ops i   in   A 3   j   in   A 2 node   i   in   A 3   node   j   in   A ( A 1 A 3 ) + 0   hash   ops i   in   A 5   j   in   A 5 + 1   hash   ops i   in   A 5   j   in   ( A A 5 ) node   i   in   A 5   node   j   in   A ) = ( 2 n 5 ( n n 5 ) + 4 n 2 n 3 ) / n 2
By the same argument, the average numbers of hash operations are N a v g ( B ) =   ( 2 n 6 ( n n 6 ) + 4 n 2 n 4 ) / n 2 and N a v g ( C ) = ( 2 n 6 ( n n 6 ) + 4 n 2 n 4 ) / n 2 for groups B and C. Each node in group x performs the hash function f(·) an average of N a v g ( x ) times on all the l shared keys where lq. Since P S h a r e ( 1 ) ( l ) / P L i n k - E s t ( 1 ) is the probability that an established link is secured with l keys for a single-intersected group, the total average number N I 2 KPSP ( x ) ,   x { A ,   B   , C } of hash operations in group x for q-composite I2KPSP is calculated in Equation (16).
N I 2 KPSP ( x ) = N a v g ( x ) × l = q m l × P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) ,   where   x { A ,   B ,   C } ,   N a v g ( A ) = ( 2 n 5 ( n n 5 ) + 4 n 2 n 3 ) / n 2 ,   N a v g ( B ) = ( 2 n 6 ( n n 6 ) + 4 n 2 n 4 ) / n 2   and   N a v g ( C ) = ( 2 n 7 ( n n 7 ) + 4 n 3 n 4 ) / n 2
I2KPDP and I2KPSP do not have resiliency against LNAs, since attackers may know the nodes belong to the intersected groups from their locations. By an LNA, attackers could intentionally capture k nodes in the intersected groups A1, A2, A3, and A4. Theorem 3 shows all the probabilities P L i n k - C o m ( A 1 G ) , P L i n k - C o m ( A 2 G ) , and P L i n k - C o m ( A 3 G ) greater than P L i n k - C o m ( A G ) , and this means that an LNA is more severe and damaging than an NA. When compared with the case where k nodes are captured in a random fashion in group A, the captured nodes in the intersected groups A1, A2, and A3 aggravate the NA attack.
Theorem 3.
In q-composite I2KPDP and I2KPSP, when k nodes are captured randomly in the intersected groups A 1 , A 2 , and A 3 (i.e., using LNA), the probabilities P L i n k - C o m ( A 1 G ) , P L i n k - C o m ( A 2 G ) , and P L i n k - C o m ( A 3 G ) of a link being compromised are greater than the probability P L i n k - C o m ( A G ) .
Proof. 
Suppose k captured nodes are in A 1 , and there are C k n 1 types to select k captured nodes. Because of using an LNA, attackers could capture all these k nodes in A 1 . Thus, based on the notion of Equation (12), we can derive P L i n k - C o m ( A 1 G ) , P L i n k - C o m ( A 2 G ) , and P L i n k - C o m ( A 3 G ) as follows.
P L i n k - C o m ( A 1 G ) 1 3 ( C k n 1 C k n 1 attacker   intentionally capture   k   nodes   in   A 1 3 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) compromise   the   links   in   three   groups   A ,   B   and   C ) = l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) P L i n k - C o m ( A 2 G ) 1 3 ( C k n 2 C k n 2 attacker   intentionally capture   k   nodes   in   A 2 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) compromise   the   links   in   two   groups   A   and   B ) = 2 3 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) P L i n k - C o m ( A 3 G ) 1 3 ( C k n 3 C k n 3 attacker   intentionally capture   k   nodes   in   A 3 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) compromise   the   links   in   two   groups   A   and   C ) = 2 3 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
Via Equation (12), we have P L i n k - C o m ( A G ) C k n + C k n 1 + n 2 + C k n 1 + n 3 3 C k n l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) . Since n 1 < < n , n 2 < < n , and n 3 < < n , ( C k n 1 + n 2 + C k n 1 + n 3 ) < C k n . Finally, we have P L i n k - C o m ( A 1 G ) , P L i n k - C o m ( A 2 G ) , and P L i n k - C o m ( A 3 G ) greater than P L i n k - C o m ( A G ) . □
The above demonstrates that I2KPDP and I2KPSP do not have resiliency against LNAs. In addition, for I2KPSP, the nodes in intersected groups store the nonce in plaintext type. The attacker can capture only one node to obtain the nonce. Thus, if an attacker compromises one node in area A1 to get rC, he can capture nodes in A2 for raw keys and then compromise the link in group C with the compromised raw keys in A2. To effectively tackle LNAs and solve the above problem in I2KPSP, we adopt a hash chain to design I2KPHC.

4.3. The Proposed I2KPHC

We adopt the hash chain approach in [7] and, in the meantime, give the nodes in intersected groups the large node identifier “j” to resist LNAs, where 1 ≤ jn and the value n is the group size (the number of nodes for each group). In fact, we can use different key pools like in I2KPDP or a single pool like in I2KPSP to design the proposed I2KPHC. When using different key pools, we just need one hash function, while we need different hash functions for different groups when using one key pool. We also use three groups, A, B, and C, to describe I2KPHC. As illustrated in Figure 6, we adopt one key pool S and three hash functions, h A ( ) , h B ( ) , and h C ( ) , for each group to describe our I2KPHC.
Consider a node with ID “j” for the following cases: (i) in group ( x ( x y ) ( x z ) ) , (ii) in group ( x y ) , and (iii) in group ( x y z ) , where x, y, z∈{A, B, C}. Suppose m random keys (say K 1 ~ K m ) are selected from key pool S, then m hashed keys ( h x j ( K 1 ) ~ h x j ( K m ) m   hashed   keys   using   h x ( ) ) are given to node #j in group ( x ( x y ) ( x z ) ) . There are 2m hashed keys ( h x j ( K 1 ) ~ h x j ( K m ) m   hashed   keys   using   h x ( ) , h y j ( K 1 ) ~ h y j ( K m ) m   hashed   keys   using   h y ( ) ) and 3m hashed keys ( h x j ( K 1 ) ~ h x j ( K m ) m   hashed   keys   using   h x ( ) ,   h y j ( K 1 ) ~ h y j ( K m ) m   hashed   keys   using   h y ( ) , h z j ( K 1 ) ~ h z j ( K m ) m   hashed   keys   using   h z ( ) ) given to node #j in the intersected groups ( x y ) and ( x y z ) , respectively. Finally, as shown in Figure 5, nodes #5, #6, and #7 in areas A5, A6 and A7 have a ring size of m; nodes #2, #3, and #4 in areas A2, A3, and A4 have a ring size of 2m; and node #7 in A1 area has a ring size of 3m.
Suppose a key K I D with an identifier ID is selected from S given to a node with node ID “ j 1 ”. If the node is in the group ( x ( x y ) ( x z ) ) , it receives the key h x j 1 ( K I D ) . Suppose another node with node ID “ j 2 ” is also in the group ( x ( x y ) ( x z ) ) ; it has h x j 2 ( K I D ) . When j 1 > j 2 , the node # j 2 applies the hash function h x ( )   ( j 1 j 2 ) times on h x j 2 ( K I D ) , and then both nodes may share a common key h x j 1 ( K I D ) . Consider other cases for node # j 2 in (i) ( x y ) , (ii) ( x z ) , (iii) ( x y z ) , (iv) ( y ( x y ) ( y z ) ) , and (v) ( z ( y z ) ( x z ) ) . For cases (i), (ii), and (iii), node # j 2 also has h x j 2 ( K I D ) such that it can share the same key h x j 1 ( K I D ) with node # j 1 . However, node # j 2 for cases (iv) and (v) only has h y j 2 ( K I D ) and h z j 2 ( K I D ) , respectively, and thus it cannot share the common key with the node # j 1 . Via the above observations, the approach using the hash function does not affect establishing a link, but it needs extra hash operations when establishing secure links. Although the I2KPHC in Figure 6 uses one key pool for all groups, it adopts different hash functions for different groups. All the properties of I2KPHC are more similar to those of I2KPSP, because both approaches use one key pool. However, I2KPHC has the same key ring sizes as I2KPDP. The probabilities P S h a r e ( x ) ( l ) , P S h a r e ( x y ) ( l ) , P S h a r e ( x y z ) ( l ) , P L i n k - E s t ( x ) , P L i n k - E s t ( x y ) , and P L i n k - E s t ( x y z ) , where x, y, and z∈{A, B, C}, are the same as in I2KPSP. And, the proposed I2KPHC also satisfies intragroup and intergroup conditions.
When compared with I2KPDP and I2KPDSP, the major difference of I2KPHC is resiliency against LNAs. LNA resiliency based on the hash chain is described as follows. The diagrammatic representation of key selection rules is illustrated in Figure 7. The number of nodes for each group is n ( | A | = | B | = | C | =n). For simplicity, we use 1~n to represent the node IDj”, where 1 ≤ jn. How to choose an encoded ID for sensor nodes for disjointed areas in groups A, B, and C to resist LNAs is given in Figure 7a–c, respectively.
Consider the key selections for group A, which is composed of four geometrically disjointed areas (A1, A2, A3, A5). From I2KPDP and I2KPSP, it is observed that the captured nodes in intersected groups, e.g., in ( x y z ) and ( x y ) , the NA will be seriously aggravated. Therefore, we define three levels of resiliency (high, medium, low) against NAs for the intersected groups: A1 (triple-intersected), A2 and A3 (double-intersected), and A5 (single-intersected)). We use medium resiliency for A2 and A3, because both areas have probabilities of compromised links in ( A B ) and ( A C ) , respectively. The reason choosing high resiliency for A1 is to resist the high probability of compromised links. The key selection for group A is illustrated in Figure 7a. We use the ID  j [ n 2 + n 3 + n 5 + 1 ,   n ] to prepare a hashed key h A j ( K e y ) for A 1 , the ID  j [ n 2 + n 5 + 1 ,   n 2 + n 3 + n 5 ] to prepare a hashed key h A j ( K e y ) for A2, the ID  j [ n 5 + 1 ,   n 2 + n 5 ] to prepare a hashed key h A j ( K e y ) for A3, and the ID  j [ 1 ,   n 5 ] to prepare a hashed key h A j ( K e y ) for A5. When the nodes in A1 are captured, an attacker has the hashed key h A j 1 ( K e y ) , where j 1 [ n 2 + n 3 + n 5 + 1 ,   n ] , but he cannot obtain the hashed key h A j 2 ( K e y ) for node # j 2 in areas A2, A3, and A5 because j 1 > ( n 2 + n 3 + n 5 ) j 2 . We can also check another situation where if node # j 1 is in areas A2 and A3 and node # j 2 is in area A 5 , both nodes # j 1 and # j 2 cannot share the common key. This is because j 1 [ n 5 + 1 ,   n 2 + n 3 + n 5 ] is greater than j 2 [ 1 ,   n 5 ] . Obviously, node # j 1 in A5 only has the probability to obtain the same hashed key h A j 2 ( K e y ) with node # j 2 also located in A5. By the same argument, we can choose the hashed keys for sensor nodes in groups B and C. The key selections for groups B (including A1, A2, A4, and A6) and C (including A1, A3, A4, and A7) are shown in Figure 7b,c, respectively.
In [7], a parameter key-chain length L is introduced to reduce these hash operations. Each node #j applies one-way hash operation to their keys j (mod L) times instead of j times, namely storing h x j   ( mod   L ) ( K e y ) instead of h x j ( K e y ) . Finally, the number of hash operations for establishing a pairwise key is bounded by L. When adopting the notion of key-chain length L in I2KPHC to save energy consumption overhead, the key selections in Figure 7a–c should be a little modified. Here, we only use key selection for group A to describe the modification. We first define L 1 ,   L 2 ,   L 3 ,   and   L 5 , where L = L 1 + L 2 + L 3 + L 5 . The choice of these values can be determined according to the group size n and the reduction in computation overhead. After the key selection for group A in Figure 7a, let the node ID  j A 1 [ n 2 + n 3 + n 5 + 1 ,   n ] , j A 2 [ n 2 + n 5 + 1 ,   n 2 + n 3 + n 5 ] , j A 3   [ n 2 + n 5 + 1 ,   n 2 + n 3 + n 5 ] , and j A 5 [ n 5 + 1 ,   n 2 + n 5 ] . Next, we figure out the new modified ID j A 1 , j A 2 , j A 3 , and j A 5 by Equation (18a). By the same argument, we may choose L 4 ,   L 6   and   L 7 for A 4 ,   A 6   and   A 7 , and the new modified ID for groups B and C are given in Equations (18b) and (18c), respectively.
j A 1 = j A 1   ( mod   L 1 ) + ( L 2 + L 3 + L 5 ) ; j A 2 = j A 2   ( mod   L 2 ) + ( L 3 + L 5 ) j A 3 = j A 3   ( mod   L 3 ) + L 5 ; j A 5 = j A 5   ( mod   L 5 )
j A 1 = j A 1   ( mod   L 1 ) + ( L 2 + L 4 + L 6 ) ; j A 2 = j A 2   ( mod   L 2 ) + ( L 4 + L 6 ) j A 4 = j A 4   ( mod   L 4 ) + L 6 ; j A 6 = j A 6   ( mod   L 6 )
j A 1 = j A 1   ( mod   L 1 ) + ( L 3 + L 4 + L 7 ) ; j A 3 = j A 3   ( mod   L 3 ) + ( L 4 + L 7 ) j A 4 = j A 4   ( mod   L 4 ) + L 7 ; j A 7 = j A 7   ( mod   L 7 )
We herein use the original node ID to more easily analyze the LNA resiliency of our I2KPHC. Actually, both have similar results. Lemma 2 shows the probability that a given key is known in the area A j when a node is randomly captured in the area A i . And, the probability α A i A j , where 0 α A i A j 1 , is referred to as an improvement in I2KPHC. Since each node has m keys from key pool S, the probability that a key has been discovered in A j when a node is compromised in A i is ( α A i A j m / | S | ) for I2KPHC. Thus, the value α A i A j = 1 implies no improvement from using a hash chain, i.e., the probabilities of compromised links are unchanged. On the other hand, ( α A i A j m / | S | ) is 0 for α A i A j = 0 . Namely, the approach can completely tackle LNAs. The value α A i A j ranging from 1 to 0 shows the attack mitigation of LNAs. A hash chain could reduce interception from the attacker, and that is why we call the value α A i A j “improvement”.
Lemma 2.
When using the hash chain class with n ( h x j ( K e y ) ,   1 j n ) in I2KPHC, the probability α A i A j is derived as follows.
α A i A j = ( n i + 1 ) / ( 2 n i ) ;   if   A i = A j α A i A j = 0   ;   if   ( node   ID   j 1 A i > j 2 A j ) ( no   same   hash   function   in   A i   and   A j ) α A i A j = 1   ;   if   ( node   ID   j 1 A i j 2 A j ) ( one   same   hash   function   in   A i   and   A j )
Proof. 
For the case A i = A j with | A i | = n i nodes in this area, suppose the node ID in A i ranges between n x and ( n x + n i 1 ) . For any hashed key stored in the nodes in A i , it is initially hashed ( n x + w ) times, where 0 w ( n i 1 ) , with a probability 1 / n i . When a captured node is hashed ( n x + w ) times, the probability that a key has the same identifier can be figured out is ( n i w ) / n i (note: a hash function can only be accomplished forwardly). Thus, the probability to find a key having the same identifier with a compromised node is w = 0 n i 1 1 / n i ( n i w ) / n i = ( n i + 1 ) / ( 2 n i ) . Consider the case “(node ID j1Ai > j2Aj) (no same hash function in Ai and Aj)”. Firstly, the condition j 1 > j 2 implies that even though both areas have same hash function h x ( ) , the hashed key h x j 1 ( K e y ) cannot be disclosed from h x j 2 ( K e y ) . Secondly, both areas with different hash function cannot have the same hashed key. Thus, we have α A i A j = 0 for this case. Consider the other case “(node ID j1Aij2Aj) (one same hash function in Ai and Aj)”. Both areas have the same hash function h x ( ) . Since j 1 j 2 , the hashed key h x j 1 ( K e y ) can be derived from h x j 2 ( K e y ) . This implies α A i A j = 1 . □
By LNAs, attackers could intentionally capture the nodes in intersected groups (A1~A4) to compromise the links. Consider intersected groups A1, A2, and A3 in group A (note: the analysis for A4 is the same as for A2 and A3 and is omitted here). In Theorem 4, the probabilities P L i n k - C o m ( A 1 G ) , P L i n k - C o m ( A 2 G ) , and P L i n k - C o m ( A 3 G ) of I2KPHC are derived, where P L i n k - C o m ( A 1 G ) and P L i n k - C o m ( A 2 G ) are lesser than those in I2KPDP and I2KPSP, and P L i n k - C o m ( A 2 G ) is almost the same. The result implies that the resiliency of I2KPHC against LNAs is enhanced.
Theorem 4.
In q-composite I2KPHC, k nodes are captured randomly in the intersected groups A1, A2, and A3 (i.e., using LNA). When compared with I2KPDP and I2KPSP, I2KPHC has smaller  P L i n k - C o m ( A 1 G ) and P L i n k - C o m ( A 2 G ) and almost the same P L i n k - C o m ( A 3 G ) .
Proof. 
Same as deriving the probabilities in Theorem 3, because there is already a large portion 57 / 64 P S h a r e ( 1 ) ( l ) , we consider using P S h a r e ( 1 ) ( l ) only. Four cases using P S h a r e ( 1 ) ( l ) in group A as deriving P S h a r e ( A ) ( l ) are (i) node i in A1 and node j in A5, (ii) node i in A2 and node j in A ( A 1 A 2 ) , (iii) node i in A3 and node j in A ( A 1 A 3 ) , and (iv) node i in A5 and node j in A. In case (i), two nodes can share a hashed key h i ( K e y ) since i > j. Thus, the link may be compromised with the probability l = q m 1 1 α A 1 A 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) with the improvement α A 1 A 1 = ( n 1 + 1 ) / 2 n 1 . For cases (ii) and (iii), the improvements α A 1 A 2 = α A 1 A 3 = 0 . Case (iv) is subdivided into node i in A5 and node j in A1, and node i in A5 and node j in (AA1), and the improvement α A 1 ( A A 1 ) = 0 . Based on the above observations, the probability P L i n k - C o m ( A 1 A ) that k captured nodes are in A1 is derived as follows.
P L i n k - C o m ( A 1 A ) 1 n 2 ( l = q m 1 1 α A 1 A 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) case   ( i ) :   node   i   in   A 1   node   j   in   A 5 + 0 ( α A 1 A 2 = 0 ) case   ( ii ) :   node   i   in   A 2 node   j   in   A ( A 1 A 2 ) + 0 ( α A 1 A 3 = 0 ) case   ( iii ) :   node   i   in   A 3 node   j   in   A ( A 1 A 3 ) + l = q m 1 1 α A 1 A 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) i   in   A 5   j   in   A 1 + 0 ( α A 1 ( A A 1 ) = 0 ) i   in   A 5   j   in   ( A A 1 ) case   ( iv ) :   node   i   in   A 5   node   j   in   A ) = 2 n 1 n 5 n 2 l = q m 1 1 ( n 1 + 1 ) 2 n 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
Same as deriving P L i n k - C o m ( A 1 A ) , we could derive P L i n k - C o m ( A 1 B ) 2 n 1 n 6 n 2   l = q m 1 1 ( n 1 + 1 ) 2 n 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) and P L i n k - C o m ( A 1 C ) 2 n 1 n 7 n 2 l = q m 1 1 ( n 1 + 1 ) 2 n 1 m | S | k l . P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) . Then, the P L i n k - C o m ( A 1 G ) is calculated as follows.
P L i n k - C o m ( A 1 G ) = P L i n k - C o m ( A 1 A ) + P L i n k - C o m ( A 1 B ) + P L i n k - C o m ( A 1 C ) = 2 n 1 ( n 5 + n 6 + n 7 ) n 2 l = q m 1 1 ( n 1 + 1 ) 2 n 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
For calculating P L i n k - C o m ( A 2 G ) and P L i n k - C o m ( A 3 G ) , we first derive P L i n k - C o m ( A 2 A ) in Equation (22). By the same argument, we also have P L i n k - C o m ( A 2 B ) , P L i n k - C o m ( A 3 A ) , and P L i n k - C o m ( A 3 C ) . Then, P L i n k - C o m ( A 2 G ) and P L i n k - C o m ( A 3 G ) are derived in Equations (23) and (24).
P L i n k - C o m ( A 2 A ) 1 n 2 ( l = q m 1 1 α A 2 A 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) case   ( i ) :   node   i   in   A 1   node   j   in   A 5 + l = q m 1 1 α A 2 A 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) case   ( ii ) :   node   i   in   A 2 node   j   in   A ( A 1 A 2 ) + l = q m 1 1 α A 2 A 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) i   in   A 3   j   in   A 2 + 0 ( α A 2 A 3 = 0 ) i   in   A 3   j   in   A 5 case   ( iii ) :   node   i   in   A 3 node   j   in   A ( A 1 A 3 ) + l = q m 1 1 α A 2 A 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) i   in   A 5   j   in   A 1 case   ( iv ) :   node   i   in   A 5   node   j   in   A + l = q m 1 1 α A 2 A 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) i   in   A 5   j   in   A 2 + 0 ( α A 2 ( A 3 A 5 ) = 0 ) i   in   A 5   j   in   ( A 3 A 5 ) case   ( iv ) :   node   i   in   A 5   node   j   in   A ) = 2 n 1 n 5 n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 2 ( n 3 + n 5 ) n 2 l = q m 1 1 ( n 2 + 1 ) 2 n 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
P L i n k - C o m ( A 2 G ) = P L i n k - C o m ( A 2 A ) + P L i n k - C o m ( A 2 B ) 2 n 1 n 5 n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 2 ( n 3 + n 5 ) n 2 l = q m 1 1 ( n 2 + 1 ) 2 n 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 1 n 6 n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 2 ( n 4 + n 6 ) n 2 l = q m 1 1 ( n 2 + 1 ) 2 n 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) = 2 n 1 ( n 5 + n 6 ) n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 4 n 2 ( n 3 + n 5 ) n 2 l = q m 1 1 ( n 2 + 1 ) 2 n 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
P L i n k - C o m ( A 3 G ) = P L i n k - C o m ( A 3 A ) + P L i n k - C o m ( A 3 C ) 2 ( n 1 n 5 + n 2 n 3 + n 2 n 5 ) n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 3 n 5 n 2 l = q m 1 1 ( n 3 + 1 ) 2 n 3 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 1 n 7 n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 3 ( n 4 + n 7 ) n 2 l = q m 1 1 ( n 3 + 1 ) 2 n 3 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) = 2 n 1 ( n 5 + n 7 ) + 2 n 2 ( n 3 + n 5 ) n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 3 ( n 4 + n 5 + n 7 ) n 2 l = q m 1 1 ( n 3 + 1 ) 2 n 3 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
For the case using P S h a r e ( 1 ) ( l ) only (a large portion 57 / 64 P S h a r e ( 1 ) ( l ) in Equation (4)), P S h a r e ( 2 ) ( l ) and P S h a r e ( 3 ) ( l ) are very small (note: choosing the values n 1 = n 2 = n 3 = n 4 = n / 8 is a reasonable choice). Equations (25)–(27) show that the probabilities P L i n k - C o m ( A 1 G ) and P L i n k - C o m ( A 2 G ) of I2KPHC are lesser than those in I2KPDP and I2KPSP, and P L i n k - C o m ( A 3 G ) is almost the same as P L i n k - C o m ( A 3 G ) in I2KPDP and I2KPSP. □
P L i n k - C o m ( A 1 G ) 2 n 1 ( n 5 + n 6 + n 7 ) n 2 l = q m 1 1 ( n 1 + 1 ) 2 n 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) = 30 64 l = q m 1 1 ( n 1 + 1 ) 2 n 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) < 30 64 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) < l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
P L i n k - C o m ( A 2 G ) 2 n 1 ( n 5 + n 6 ) n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 4 n 2 ( n 3 + n 5 ) n 2 l = q m 1 1 ( n 2 + 1 ) 2 n 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) = 20 64 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 24 64 l = q m 1 1 ( n 2 + 1 ) 2 n 2 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) 20 64 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 24 64 ( n 2 + 1 ) 2 n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) ( 1 1 ( n 2 + 1 ) 2 n 2 m | S | k ( n 2 + 1 ) 2 n 2 × 1 1 ( n 2 + 1 ) 2 n 2 m | S | k   ( while   k   is   reasonably   low   and   m | S | ) 20 64 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 12 64 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) = 32 64 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) < 2 3 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
P L i n k - C o m ( A 3 G ) 2 n 1 ( n 5 + n 7 ) + 2 n 2 ( n 3 + n 5 ) n 2 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 2 n 3 ( n 4 + n 5 + n 7 ) n 2 l = q m 1 1 ( n 3 + 1 ) 2 n 3 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) = 32 64 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) + 22 64 l = q m 1 1 ( n 3 + 1 ) 2 n 3 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) ( 32 64 + 11 64 ) l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )   ( note :   use   the   approximation   in   derivng   Equation   ( 26 ) ) = 33 64 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) 2 3 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l )
In the proposed I2KPHC, extra hash operations are required to share the common key between two nodes. The following evaluates the computation overhead in our I2KPHC. Similar to deriving the number of hash operations for I2KPSP, we use the approximation P S h a r e ( x ) ( l ) P S h a r e ( 1 ) ( l ) and ignore P S h a r e ( 2 ) ( l ) and P S h a r e ( 3 ) ( l ) (it is reasonable for n 1 = n 2 = n 3 = n 4 = n / 8 ). We still consider four cases using P S h a r e ( 1 ) ( l ) in group A as deriving P S h a r e ( A ) ( l ) : (i) node i in A1 and node j in A5, (ii) node i in A2 and node j in A ( A 1 A 2 ) , (iii) node i in A3 and node j in A ( A 1 A 3 ) , and (iv) node i in A5 and node j in A. Thus, the average number N a v g ( A ) of hash operations to share a common key is determined in Equation (28).
N a v g ( A ) = 1 n 2 ( j = 1 n 5 i = ( n 2 + n 3 + n 5 + 1 ) n ( i j ) case   ( i ) : node   i   in   A 1   node   j   in   A 5 + j = 1 n 3 + n 5 i = ( n 3 + n 5 + 1 ) n 2 + n 3 + n 5 ( i j ) case   ( ii ) : node   i   in   A 2   node   j   in   A ( A 1 A 2 ) + j = 1 n 5 i = ( n 5 + 1 ) n 3 + n 5 ( i j ) i   in   A 3   j   in   A 5 + i = ( n 5 + 1 ) n 3 + n 5 j = ( n 3 + n 5 + 1 ) n 2 + n 3 + n 5 ( j i ) i   in   A 3   j   in   A 2 case   ( iii ) :   node   i   in   A 3   node   j   in   A ( A 1 A 3 ) + i = 1 n 5 j = 1 n 5 | i j | i   in   A 5   j   in   A 5 + i = 1 n 5 j = ( n 5 + 1 ) n ( j i ) i   in   A 5   j   in   ( A A 5 ) case   ( iv ) :   node   i   in   A 5   node   j   in   A ) = n 1 ( n + n 2 + n 3 ) 2 n 2 case   ( i ) + n 2 ( n 2 + n 3 + n 5 ) 2 n 2 case   ( ii ) + ( n 2 2 + n 2 n 3 + n 3 2 + n 3 n 5 ) 2 n 2 case   ( iii ) + n 5 3 n 5 3 n 2 + ( n 1 + n 2 + n 3 ) n 2 n 2 case   ( iv )
Similar to deriving N a v g ( A ) , we can figure out N a v g ( B ) and N a v g ( C ) . Finally, in q-composite I2KPHC, both nodes should apply the average hash operations N I 2 KPHC ( x ) = N a v g ( x ) ×   l = q m l × P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) in group x when establishing a secure link.

5. Comparison and Numerical Simulations

5.1. Comparison

A comparison of various types of pairwise key predistribution schemes including KP, HKP, and our three types of I2KP—I2KPDP, I2KPSP, and I2KPHC—is shown in Table 1. We compare these schemes by the following items: (i) the key ring size, (ii) intragroup and intergroup conditions, (iii) the resiliency against LNA, (iv) the improvement in resiliency using a hash chain, (v) the probability of compromising a link, and (vi) the number of hash operations for establishing a link. After that, we will give some numerical simulations for resiliency and computation overhead.
As illustrated in Table 1, there are two schemes using hash chains: HKP and I2KPHC. Although I2KPSP uses one hash function f(·), it is not based on a hash chain. The hash function in I2KPSP is used to separate the raw key and hashed key, such that the key ring sizes in intersected groups can be reduced. About the form of the key, the keys in sensors are the raw keys in KP, I2KPDP, and the intersected groups of I2KPSP. Other schemes store the hashed keys in their key rings. Our three I2KP schemes have large key ring sizes, but they satisfy I2-conditions (intragroup and intergroup conditions). I2KPDP and I2KPSP suffer with LNAs. I2KPHC uses the large ID for sensor nodes in intersected areas to tackle LNAs.

5.2. Numerical Simulation

The resiliency (i.e., 1–the probability of a compromised link) and the network connectivity are two major terms we use to evaluate the performance key predistribution for WSNs. As defined in the intragroup condition, the nodes in one group with a common sink node have a pairwise key predistribution ability like KP. On the other hand, the intergroup condition shows that the nodes in different groups are pairwise-disjointed for the key ring, and thus they do not have the same keys to establish secure links. This is why we do not evaluate the connectivity, since the intergroup nodes cannot connect with each other, and it is the same as KP in the intragroup. In simulations, we only show the resiliency performance. We compare I2KPDP, I2KPSP, and I2KPHC when the compromised nodes are in different locations to check whether they meet intragroup and intergroup conditions, and we also evaluate their resiliencies against NAs and LNAs.

5.2.1. Resiliency

Resiliency against NAs is defined as the fraction of uncompromised links when k nodes are compromised, i.e., the resiliency is “1–(the probability of compromised link when k nodes are captured)”. The resiliencies against NAs and LNAs of I2KPDP, I2KPSP, and I2KPHC are tested. In the numerical simulation, we use | S | = 1000, m = 40, n = 160, and n 1 = n 2 = n 3 = 20 . I2KPSP has the same performance as I2KPDP, and thus we use I2KPDP for comparison only. The probability P I 2 KPDP ( N A :   A A ) =   l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) is the same as P KP ( N A ) = P L i n k - C o m ( A ) = l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) . Considering the effect on G, the probability is P I 2 KPDP ( N A :   A G ) C k n + C k n 1 + n 2 + C k n 1 + n 3 3 C k n l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) (see Equation (9)). We plot the resiliencies depending on the number of captured nodes in group A with the compromised links in A and G, respectively, for q-composite I2KPDP and I2KPSP. As illustrated in Figure 8a–c, the values of q are 1, 2, and 3, respectively. This figure shows clearly that the resiliency against NA is better when using our approach. This is because the k captured nodes in group A may be ineffective to compromise the links in other groups of G. The notation (       A G ) in Figure 8 implies that the captured nodes in set A and the compromised links are located in the whole group G = ( A B C ) . The notation (       A A ) implies that the captured nodes in set A and the compromised links are also located in the set A. The case (       A A ) is the same as applying KP in a single set, i.e., I2KPDP for the case (       A A ) is reduced as in conventional KP. For NAs, it is observed that I2KPDP (I2KPSP) with higher resiliency is really better than conventional KP. The above results also demonstrate that the intragroup condition is satisfied. Our I2KPDP (I2KPSP) is just KP for the intragroup case. On the other hand, the intergroup condition is also satisfied, since the nodes in A ( A 1 A 2 A 3 ) cannot be used for compromising the link in sets B and C. Thus, the resiliency of (       A G ) is better than that of (       A A ) .
When applying LNAs on I2KPDP (I2KPDP), we have P I 2 KPDP ( L N A :   A 1 G ) > P I 2 KPDP ( L N A :   A 2 G )   ( = P I 2 KPDP ( L N A :   A 3 G ) ) > P I 2 KPDP ( N A :   A G ) , implying that I2KPDP and I2KPSP cannot resist LNAs. Namely, an LNA is more severe than an NA. The P I 2 KPDP ( L N A :   A 1 G ) is l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) and the P I 2 KPDP ( L N A :   A 2 G ) ( = P I 2 KPDP ( L N A :   A 3 G ) ) is 2 3 l = q m 1 1 m | S | k l P S h a r e ( 1 ) ( l ) l = q m P S h a r e ( 1 ) ( l ) (see Equation (17)). Figure 9 shows the resiliencies of I2KPDP (I2KPSP) against LNAs when the captured nodes are in sets A 1 , A 2 , and A 3 , respectively, as shown Figure 9a–c. Sets A 2 and A 3 have two intersected groups. If attackers intentionally compromise the nodes in A 1 with three intersected groups to aggravate the NA (actually, this is an LNA), I2KPDP (I2KPSP) does not have resiliency. Thus, it is observed that (       A 1 G ) is worse than (       A 2 G ,   A 3 G ) . The above shows that I2KPDP (I2KPSP) cannot resist LNAs.
On the other hand, for I2KPHC, we have P I 2 KPHC ( L N A :   A 1 G ) < P I 2 KPDP ( L N A :   A 1 G ) , P I 2 KPHC ( L N A :   A 1 G ) < P I 2 KPDP ( L N A :   A 1 G ) , and P I 2 KPHC ( L N A :   A 3 G ) P I 2 KPDP ( L N A :   A 3 G ) (see Theorem 4), and this implies that I2KPHC enhances the resilience against LNAs. Figure 10a–c demonstrates the probabilities P I 2 KPHC ( L N A :   A i G )   and   P I 2 KPDP ( L N A :   A i G ) of single-composite schemes for I = 1, 2, and 3, respectively. Figure 10 compares the LNA resiliency between I2KPDP (I2KPSP) and I2KPHC. The key selection of I2KPHC (Figure 7a) is consistent with the LNA resiliency of I2KPHC when the compromised nodes are in A 1 , A 2 , and A 3 . As shown in Figure 10a,b, the (       I 2 K P H C ) has higher LNA resiliency than (       I 2 K P D P ,   I 2 K P S P ) when compromised nodes are located in A 1 and A 2 . Furthermore, I2KPHC has more LNA resiliency when compromised nodes are in area A 1 since the hashed keys in A 1 are h A j ( K e y ) ,     j [ n 2 + n 3 + n 5 + 1 ,   n ] . When captured nodes are in A 3 , the hashed keys h A j ( K e y ) ,   j [ n 5 + 1 ,   n 3 + n 5 ] have small j values. Thus, I2KPHC has almost the same LNA resiliency compared with I2KPDP (I2KPSP) (see Figure 10c).

5.2.2. Computation Overhead

For the three I2KP models, there is no need to use hash operations for I2KPDP. Other schemes need hash operations when sharing a common key between nodes. Although I2KPSP uses a hash function, this function f(·) is just used to reduce the key ring size. I2KPHC is based on the hash chain, and thus this scheme has more hash operations than I2KPSP. As described in the above, we use | S | = 1000, m = 40, n = 160, and n 1 = n 2 = n 3 = 20 (i.e., =n/8) in this numerical simulation. From Equation (16), we have N a v g ( x ) = 17 / 32 , x∈{A, B, C}, for I2KPSP. Thus, in q-composite I2KPSP, the average number of hash operation is 1.048, 1.399, and 1.829 for q = 1, 2, and 3, respectively.
Next, we adopting the key-chain length L to save energy consumption overhead and test I2KPHC. We use L = 1, L = 8, L = 16, L = 24, and L = 32, and the values L1 = L2 = L3 = L4 = L/8. Because L = L1 + L2 + L3 + L5, L = L1 + L2 + L4 + L6 and L = L1 + L2 + L4 + L7, we have L5 = L6 = L7 = (5 L)/8. Then, for L = 8, 16, 24, and 32, we have L1 = L2 = L3 = L4 = 1, 2, 3, and 4, and L5 = L6 = L7 = 5, 10, 15, and 20, respectively. Based on these values, we summarize the average number of hash computations of q-composite I2KPHC (q = 1, 2, and 3), N a v g ( x ) (from Equation (28)) in Table 2. As described in Section 4.3, when calculating N a v g ( x ) , the values of n and n i ,   1 i 7 , should be replaced by L and L i . This table shows that the average number of hash computations remains reasonable when L ≤ 32. Note that with L = 1, we exactly have conventional KP, where sensor nodes store raw keys but not hashed keys. Thus, the value N a v g ( x ) is zero.

6. Conclusions

We can use an MWSN to implement a scalable WSN and gradually deploy a large-scale WSN as the number of sensor nodes increases. Therefore, it is indeed necessary to study pairwise key predistribution in MWSNs. In this paper, we propose three types of I2KP: I2KPDP, I2KPSP, and I2KPHC. These three schemes all meet the intragroup and intergroup conditions. Each has its own advantages and disadvantages, and they are all suitable for the MWSN environment. We discuss two attacks, NAs and LNAs, based on the amount of information known to the attacker. In actual use, we can choose one of these three types of I2KP for the MWSN according to the resiliency against variants of node capture attacks, the link connectivity, the required hash operations, and the key ring size of the sensor node. Finally, the three types of I2KP not only provide security but also retain the advantages of using an MWSN.

Author Contributions

All the authors contributed equally to the manuscript preparation. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by National Science and Technology Council, under Grant No. 112-2221-E-259-007-MY2.

Data Availability Statement

All the data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Tshilongamulenzhe, T.M.; Mathonsi, T.E.; Du Plessis, D.P.; Mphahlele, M.I. Intelligent traffic routing algorithm for wireless sensor networks in agricultural environment. J. Adv. Inf. Technol. 2023, 14, 46–55. [Google Scholar] [CrossRef]
  2. Liu, J.; Zhao, Z.; Ji, J.; Hu, M. Research and application of wireless sensor network technology in power transmission and distribution system. Intell. Converg. Netw. 2020, 1, 199–220. [Google Scholar] [CrossRef]
  3. Alawad, F.; Kraemer, F.A. Value of information in wireless sensor network applications and the IoT: A review. IEEE Sens. J. 2022, 22, 9228–9245. [Google Scholar] [CrossRef]
  4. Alwasel, B.; Salim, A.; Khedr, A.M.; Osamy, W. Dominating sets-based approach for maximizing lifetime of IoT-based heterogeneous WSNs enabled sustainable smart city applications. IEEE Access 2024, 12, 44069–44079. [Google Scholar] [CrossRef]
  5. Eschenauer, L.; Gligor, V.D. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 41–47. [Google Scholar]
  6. Chan, H.; Perrig, A.; Song, D. Random key predistribution schemes for sensor networks. In Proceedings of the Symposium on Security and Privacy, Berkeley, CA, USA, 11–14 May 2003; pp. 197–213. [Google Scholar]
  7. Bechkit, W.; Challal, Y.; Bouabdallah, A. A new class of hash-chain based key pre-distribution scheme for WSN. Comput. Commun. 2013, 36, 243–255. [Google Scholar] [CrossRef]
  8. Paterson, M.B.; Stinson, D.R. A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Crypt. 2014, 71, 433–457. [Google Scholar] [CrossRef]
  9. Kendall, M.; Martin, K.M. Graph-theoretic design and analysis of key predistribution schemes. Des. Codes Crypt. 2016, 81, 11–34. [Google Scholar] [CrossRef]
  10. Yagan, O.; Makowski, A.M. Wireless sensor networks under the random pairwise key predistribution scheme: Can resiliency be achieved with small key rings? IEEE/ACM Trans. Netw. 2016, 24, 3383–3396. [Google Scholar] [CrossRef]
  11. Ehdaie, M.; Alexiou, N.; Ahmadian, M.; Aref, M.R.; Papadimitratos, P. 2D hash chain robust random key distribution scheme. Inf. Process. Lett. 2016, 16, 367–372. [Google Scholar] [CrossRef]
  12. Zhao, J. Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links. IEEE/ACM Trans. Netw. 2017, 25, 1789–1802. [Google Scholar] [CrossRef]
  13. Gandino, F.; Ferrero, R.; Rebaudengo, M. A key distribution scheme for mobile wireless sensor networks: Q-s-Composite. IEEE Trans. Inf. Forensics Secur. 2017, 12, 34–47. [Google Scholar] [CrossRef]
  14. Dalai, D.K.; Sarkar, P. Sensornet—A key predistribution scheme for distributed sensors using nets. In Proceedings of the 6th International Conference on Sensor Networks—SENSORNETS, INSTICC, ScitePress, Porto, Portugal, 19–21 February 2017; pp. 49–58. [Google Scholar]
  15. Ahlawat, P.; Dave, M. An attack resistant key predistribution scheme for wireless sensor networks. J. King Saud Univ.-Comput. Inf. Sci. 2021, 33, 268–280. [Google Scholar] [CrossRef]
  16. Harn, L.; Hsu, C.F. Predistribution scheme for establishing group keys in wireless sensor networks. IEEE Sens. J. 2015, 15, 5103–5108. [Google Scholar] [CrossRef]
  17. Mehmood, A.; Umar, M.M.; Song, H. ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Netw. 2017, 55, 97–106. [Google Scholar] [CrossRef]
  18. Chen, Y.R.; Tzeng, W.G. Group key management with efficient rekey mechanism: A semi-stateful approach for out-of-synchronized members. Comput. Commun. 2017, 98, 31–42. [Google Scholar] [CrossRef]
  19. Price, A.; Kosaka, K.; Chatterjee, S. A secure key management scheme for sensor networks. In Proceedings of the 10th Americas Conference on Information Systems, New York, NY, USA, 6–8 August 2004. [Google Scholar]
  20. Das, D.; Rehena, Z.; Roy, S.; Mukherjee, N. Multiple-sink placement strategies in wireless sensor networks. In Proceedings of the 5th International Conference on Communication Systems and Networks, Bangalore, India, 7–10 January 2013; pp. 1–7. [Google Scholar]
  21. Rehena, Z.; Das, D.; Roy, S.; Mukherjee, N. Multiple sink placement in partitioned wireless sensor networks. Int. J. Next-Gener. Comput. 2015, 6, 79–95. [Google Scholar]
  22. Deng, R.; He, S.; Chen, J. An online algorithm for data collection by multiple sinks in wireless-sensor networks. IEEE Trans. Control Netw. Syst. 2018, 5, 93–104. [Google Scholar] [CrossRef]
  23. Dick, M.; Alwabel, M.; Kwon, Y. Multiple sink nodes to improve performance in WSN. J. Korea Multimed. Soc. 2019, 22, 676–683. [Google Scholar]
  24. Doostali, S.; Babamir, S.M. An energy efficient cluster head selection approach for performance improvement in network-coding-based wireless sensor networks with multiple sinks. Comput. Commun. 2020, 164, 188–200. [Google Scholar] [CrossRef]
  25. Chandel, S.T.; Sharma, S. Deployment of multiple sink in different monitoring areas based on the optimization technique. Int. J. Sens. Wirel. Commun. Control 2020, 10, 915–928. [Google Scholar] [CrossRef]
Figure 1. Various KP schemes: (a) 1-composite KP and 2-composite KP; (b) 1-composite HKP; (c) 1-composite HCKP using key-chain length L = 10.
Figure 1. Various KP schemes: (a) 1-composite KP and 2-composite KP; (b) 1-composite HKP; (c) 1-composite HCKP using key-chain length L = 10.
Sensors 25 00086 g001
Figure 2. Pairwise key predistribution in MWSN.
Figure 2. Pairwise key predistribution in MWSN.
Sensors 25 00086 g002
Figure 3. The proposed I2KPDP.
Figure 3. The proposed I2KPDP.
Sensors 25 00086 g003
Figure 4. The keys used between subgroups in group A for I2KPDP.
Figure 4. The keys used between subgroups in group A for I2KPDP.
Sensors 25 00086 g004
Figure 5. The proposed I2KPSP.
Figure 5. The proposed I2KPSP.
Sensors 25 00086 g005
Figure 6. The proposed I2KPHC.
Figure 6. The proposed I2KPHC.
Sensors 25 00086 g006
Figure 7. Key selections in I2KPHC to resist LNA for (a) group A, (b) group B, and (c) group C.
Figure 7. Key selections in I2KPHC to resist LNA for (a) group A, (b) group B, and (c) group C.
Sensors 25 00086 g007
Figure 8. NA resiliency on the number of captured nodes for q-composite I2KPDP (I2KPSP) with (a) q = 1, (b) q = 2, and (c) q = 3.
Figure 8. NA resiliency on the number of captured nodes for q-composite I2KPDP (I2KPSP) with (a) q = 1, (b) q = 2, and (c) q = 3.
Sensors 25 00086 g008
Figure 9. LNA resiliency on the number of captured nodes for q-composite I2KPDP (I2KPSP) with (a) q = 1, (b) q = 2, and (c) q = 3.
Figure 9. LNA resiliency on the number of captured nodes for q-composite I2KPDP (I2KPSP) with (a) q = 1, (b) q = 2, and (c) q = 3.
Sensors 25 00086 g009
Figure 10. LNA resiliency on the number of captured nodes for the 1-composite I2KPDP (I2KPSP) and I2KPHC when the k captured nodes are in the intersected group: (a) A1; (b) A2; (c) A3.
Figure 10. LNA resiliency on the number of captured nodes for the 1-composite I2KPDP (I2KPSP) and I2KPHC when the k captured nodes are in the intersected group: (a) A1; (b) A2; (c) A3.
Sensors 25 00086 g010
Table 1. Comparison of various KP schemes.
Table 1. Comparison of various KP schemes.
SchemeKey Ring SizeI2-Cond.LNA
Resiliency
Improvement
Against LNA
Prob. of
Compromised Link
Num. of Hash
Operations
KPmNONO P ( KP ) # 2
HKPmNONO P ( HKP ) # 3 N HKP ( x ) # 6
I2KPDPm/2m/3mYESNO P ( I 2 KPDP ) # 4
I2KPSPm/(m + 2)/(m + 3)YESNO P ( I 2 KPSP ) # 4 N I 2 KPSP ( x ) # 7
I2KPHCm/2m/3mYESYES α A i A j # 1 P ( I 2 KPHC ) # 5 N I 2 KPHC ( x ) # 8
# 1 : improvent   for   LNA   α A i A j = ( n i + 1 ) / ( 2 n i ) ,   0 ,   or   1   ( Lemma   2 )   # 2 :   P ( KP ) = P L i n k - C o m ( x ) = l = q m x 1 1 m x | S x | k l P S h a r e ( x ) ( l ) P L i n k - E s t ( x ) ; # 3 :   P ( HKP ) = P L i n k - C o m ( x ) = l = q m x 1 1 n + 1 2 n m x | S x | k l P S h a r e ( x ) ( l ) P L i n k - E s t ( x )   # 4 :   P ( I 2 KPDP ) = P ( I 2 KPSP ) = P L i n k - C o m ( A i G )   ( Theorem   3 ) ; # 5 :   P ( I 2 KPHC ) = P L i n k - C o m ( A i G )   ( Theorem   4 )   # 6 : N HKP ( x ) = ( n 2 1 ) 6 n × l = q m l × P S h a r e ( 1 ) ( l ) / l = q m P S h a r e ( 1 ) ( l ) ; # 7 : N I 2 KPSP ( x ) = N a v g ( x ) × l = q m l × P S h a r e ( 1 ) ( l ) / l = q m P S h a r e ( 1 ) ( l )   # 8 : N I 2 KPHC ( x ) = N a v g ( x ) × l = q m l × P S h a r e ( 1 ) ( l ) / l = q m P S h a r e ( 1 ) ( l ) .
Table 2. Average number of hash operations for I2KPHC.
Table 2. Average number of hash operations for I2KPHC.
L N a v g ( x ) N I 2 K P H C ( x )
q = 1q = 2q = 3
10000
80.4870.9611.2831.677
160.5000.9861.3171.722
240.5040.9951.3281.737
320.5070.9991.3341.744
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, C.-N.; Gu, T.-S.; You, J.-C.; Wang, C.-J. Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks. Sensors 2025, 25, 86. https://doi.org/10.3390/s25010086

AMA Style

Yang C-N, Gu T-S, You J-C, Wang C-J. Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks. Sensors. 2025; 25(1):86. https://doi.org/10.3390/s25010086

Chicago/Turabian Style

Yang, Ching-Nung, Ting-Song Gu, Jhou-Cian You, and Chang-Ji Wang. 2025. "Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks" Sensors 25, no. 1: 86. https://doi.org/10.3390/s25010086

APA Style

Yang, C.-N., Gu, T.-S., You, J.-C., & Wang, C.-J. (2025). Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks. Sensors, 25(1), 86. https://doi.org/10.3390/s25010086

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop