Next Article in Journal
Security Incident Information Exchange for Cloud Service Provisioning Chains
Previous Article in Journal
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Previous Article in Special Issue
An Enhanced Key Management Scheme for LoRaWAN
Article Menu

Export Article

Open AccessArticle
Cryptography 2018, 2(4), 40;

Redundancy in Key Management for WSNs

Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy
These authors contributed equally to this work.
Author to whom correspondence should be addressed.
Received: 31 October 2018 / Revised: 29 November 2018 / Accepted: 5 December 2018 / Published: 8 December 2018
(This article belongs to the Special Issue Key Management in Wireless Sensor Network)
Full-Text   |   PDF [693 KB, uploaded 8 December 2018]   |  


Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total number of nodes in the network. An example is represented by the schemes based on combinatorial design. These schemes use specific rules for the generation of sets of keys that are distributed to the nodes before deploying the network. The aim of these approaches is to improve the resilience of the network. However, the quantity of data that must be stored by each node is proportional to the number of nodes of the network, so the available memory affects the applicability of these schemes. This paper investigates the opportunity of reducing the storage overhead by distributing the same set of keys to more than one node. In addition, the presence of redundant sets of keys affects the resilience and the security of the network. A careful analysis is conducted to evaluate benefits and drawbacks of redundant key distribution approaches. The results show that the use of redundancy decreases the level of resilience, but it scales well on very large networks. View Full-Text
Keywords: WSN; key management; combinatorial design WSN; key management; combinatorial design

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Gandino, F.; Montrucchio, B.; Rebaudengo, M. Redundancy in Key Management for WSNs. Cryptography 2018, 2, 40.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics



[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top