Next Article in Journal
Security Incident Information Exchange for Cloud Service Provisioning Chains
Previous Article in Journal
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Previous Article in Special Issue
An Enhanced Key Management Scheme for LoRaWAN
Open AccessArticle

Redundancy in Key Management for WSNs

Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Cryptography 2018, 2(4), 40; https://doi.org/10.3390/cryptography2040040
Received: 31 October 2018 / Revised: 29 November 2018 / Accepted: 5 December 2018 / Published: 8 December 2018
(This article belongs to the Special Issue Key Management in Wireless Sensor Network)
Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total number of nodes in the network. An example is represented by the schemes based on combinatorial design. These schemes use specific rules for the generation of sets of keys that are distributed to the nodes before deploying the network. The aim of these approaches is to improve the resilience of the network. However, the quantity of data that must be stored by each node is proportional to the number of nodes of the network, so the available memory affects the applicability of these schemes. This paper investigates the opportunity of reducing the storage overhead by distributing the same set of keys to more than one node. In addition, the presence of redundant sets of keys affects the resilience and the security of the network. A careful analysis is conducted to evaluate benefits and drawbacks of redundant key distribution approaches. The results show that the use of redundancy decreases the level of resilience, but it scales well on very large networks. View Full-Text
Keywords: WSN; key management; combinatorial design WSN; key management; combinatorial design
Show Figures

Figure 1

MDPI and ACS Style

Gandino, F.; Montrucchio, B.; Rebaudengo, M. Redundancy in Key Management for WSNs. Cryptography 2018, 2, 40.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop