Next Article in Journal
Security Incident Information Exchange for Cloud Service Provisioning Chains
Previous Article in Journal
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Previous Article in Special Issue
An Enhanced Key Management Scheme for LoRaWAN
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Redundancy in Key Management for WSNs

by
Filippo Gandino
*,†,
Bartolomeo Montrucchio
and
Maurizio Rebaudengo
Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Cryptography 2018, 2(4), 40; https://doi.org/10.3390/cryptography2040040
Submission received: 31 October 2018 / Revised: 29 November 2018 / Accepted: 5 December 2018 / Published: 8 December 2018
(This article belongs to the Special Issue Key Management in Wireless Sensor Network)

Abstract

:
Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total number of nodes in the network. An example is represented by the schemes based on combinatorial design. These schemes use specific rules for the generation of sets of keys that are distributed to the nodes before deploying the network. The aim of these approaches is to improve the resilience of the network. However, the quantity of data that must be stored by each node is proportional to the number of nodes of the network, so the available memory affects the applicability of these schemes. This paper investigates the opportunity of reducing the storage overhead by distributing the same set of keys to more than one node. In addition, the presence of redundant sets of keys affects the resilience and the security of the network. A careful analysis is conducted to evaluate benefits and drawbacks of redundant key distribution approaches. The results show that the use of redundancy decreases the level of resilience, but it scales well on very large networks.

1. Introduction

A Wireless Sensor network (WSN) is a distributed computer network. The nodes that compose the WSN are autonomous devices which can collect data from the surrounding environment, perform some elaborations and communicate wirelessly with the other nodes of the network. The typical nodes are low-cost devices with limited power and computational capabilities. WSNs are currently applied in many fields, from military applications [1] to cold chain monitoring [2,3].
Symmetric cryptography is normally used to protect the communications. Since WSNs have specific characteristics, such as low computational capabilities and a large quantity of autonomous distributed nodes, they require specific key-management schemes to generate and distribute the keys used to encrypt and/or authenticate the messages. Although there exist lightweight public key schemes [4], they are only applied if the involved devices are considered compliant with the additional overhead [5,6].
In literature, many key-management schemes based on different approaches have been proposed. Any kind of approach involves benefits and drawbacks that are compliant with specific characteristics (e.g., mobile nodes and deployment knowledge). Many approaches are based on predeployment key distribution. Some of these schemes involve a memory overhead proportional to the number of nodes in the network. Therefore, the size of available memory involves an upper bound to the maximum number of nodes in the network. An opportunity to remove this threshold is represented by the distribution of redundant sets of keys. i.e., the same set distributed to multiple nodes. For example, the network could be divided in two parts. A complete distribution is done among one half of the nodes, while each node of the other part has the copy of a set from one node of the first part. In this way the size of the network is the double, with the same memory overhead. In this paper, the predeployment distribution approaches are investigated and they are extended with the concept of security. The differences and similarities of the various approaches are analyzed to identify their effects on resilience. The results show that the use of redundancy decreases the level of resilience, but it scales well on very large networks.
The organization of the rest of the paper is the following: in Section 2 related works are described, Section 3 describes redundancy effects in key management, in Section 4 redundant schemes are analyzed, finally, conclusions are drawn in Section 5.

2. Related Works

In this section, a brief description of the main state-of-the-art approaches is presented. For a more in-depth description it is possible to read existing surveys on key distribution in WSNs [7,8].

2.1. Global Key

In the class of schemes, based on a global key, all nodes share a master key that is used to establish the final pairwise keys.
Besides PGK, the main scheme based on a global master key is the Symmetric-key key establishment, which is adopted by ZigBee (ZigBee Specification 1.0, June 2005, ZigBee Alliance). In this scheme, a node A, with identification number ID A , starts the key establishment by sending a random number (C A ). To generate a common secret, a node B with identification number ID B , after receiving the initial message, computes a new random number (C B ) and executes a keyed hash function with the global master key on the concatenation of the subsequent data: ID B , ID A , C B and C A . After generating the common secret, node B executes a hash function on this secret to generate the pairwise key. Then, node B sends back its identifier ID B , the random number C B and the Message authentication code (MAC), calculated on the concatenation of the subsequent data: a constant number k 1 , ID B , ID A , C B and C A . Then, node A calculates the pairwise key, checks the MAC and sends to node B a new MAC generated from the same data concatenated to a second constant number k 2 .

2.2. Full Pairwise Keys

In the full pairwise keys scheme (FPWK) all the keys are distributed before deployment, and no additional operation is required. Each possible link has a specific key, so each node stores a key per each other node in the network.

2.3. Random Key Predistribution Approaches

Random key predistribution basically consists in the generation of a large quantity of secret material and in the random distribution of a part of this material to each node. The first random key predistribution approach has been proposed by Eschenauer and Gligor [9]. In this approach, a pool containing p keys is generated before deployment. Then, a ring containing r keys, that are randomly selected from the pool, is picked up by each node. During the network initialization, each node checks if there are shared keys with other neighboring nodes. The values of p and r determine the probability of establishing a link between two nodes and the quantity of secret keys that an adversary can obtain by compromising a node.
A subsequent scheme based on random key predistribution is the q-composite random key predistribution [10]. With this scheme two nodes must share at least q starting keys to establish a link. They generate a pairwise key by performing a hash function on the concatenation of all shared starting keys. The main drawback of q-composite random key predistribution with respect to the scheme proposed by Eschenauer and Gligor is the larger quantity of memory required.

2.4. Combinatorial Design

In combinatorial design [11], and in particular in block design, it is possible to generate sets of elements that respect specific properties. These sets of elements can be used for various applications such as cryptography.
In the key-management schemes based on block design, the elements correspond to the keys and the sets correspond to the rings assigned to the nodes. Among block design a class often used for key management is the Symmetric Balanced Incomplete Block Design (SBIBD). This strategy allows to generate sets of keys with the following characteristics:
  • a pool is composed of p = r 2 r + 1 keys,
  • the number of rings of keys, which corresponds to the maximum number of nodes, corresponds to n = p ,
  • each ring is composed by r keys,
  • the same key is present in r rings, so it is shared by r nodes,
  • the same set composed by more than one key cannot be present in more than one block.
Many papers adopt combinatorial design and in particular SBIBD for key management. A detailed description is included in [12]. In [13,14], the application of SBIBD and Generalized Quadrangles to key management is investigated and a hybrid proposal was presented. Srinivasa et al. [15] proposed an approach based on SBIBD and multiple key-space. Lee and Stinson [16] used Transversal designs. Ruj and Roy [17] used partially BIBDs, while Bechkit et al. [18] used unital design. In [19], Ruj et al. also managed the triple key distribution that protects against malicious nodes forwarding fake messages.

3. Redundant Key Management

PGK, FPWK and combinatorial design schemes can be defined deterministic schemes with predeployment key distribution. In this general approach, sets of keys are distributed to the nodes according to specific rules. The presence of redundant sets, distributed to more than one node, depends on the adopted strategy. However, all these options can be considered as specific configurations of the deterministic predeployment key distribution.
In the deterministic predeployment key distribution, the set of r keys loaded by a node is defined ring, while the set of all the p keys in the network is defined pool. There are two kinds of redundancy: one related to the individual keys and another one to the rings. The redundancy of a key ( t k ) corresponds to the quantity of nodes that know that key, while the redundancy of a ring ( t r ) corresponds to the quantity of nodes that have that identical ring. The possible values of t k are between 2 and the number of nodes n. The values of t r are between 1 and n.
In PGK, there is only one key. This scheme corresponds to the deterministic predeployment key distribution with r = 1 , p = 1 , t k = n and t r = n . This configuration has the minimum quantity of keys and the maximum value of redundancy.
In FPWK there is a key per link. Therefore, the configuration is r = n 1 , p = n 2 n 2 , t k = 2 and t r = 1 . This configuration has the maximum quantity of keys and the minimum redundancy. However, FPWK requires that each node stores a quantity of keys equal to the size of the network. Therefore, the limit to the memory available for key storing also represents a limit for the number of nodes in the network.
The intermediate solutions between the global key scheme and FPWK can be obtained by applying ring redundancy to the latter scheme. If each ring, which is unique in FPWK, is loaded by two nodes, the new configuration is r = n 2 1 , p = n 2 2 n 8 , t k = 4 and t r = 2 . More in general, in the deterministic predeployment key distribution with ring redundancy t r , the parameters are:
r = n t r 1 ,
p = n 2 n t r 2 t r 2 ,
and
t k = 2 t r
A relevant element of the previous configuration corresponds to (3). This formula implies that each key is only included in two rings, and the whole redundancy depends on t r . Therefore, this configuration is called the minimum key redundancy configuration.
The schemes based on combinatorial design have key redundancy and no ring redundancy. Since n = r 2 r + 1 , a scheme based on SBIBD corresponds to the deterministic predeployment key distribution with r = t k = 4 n 3 + 1 2 , p = n , and t r = 1 . However, as with for FPWK, the total number of nodes in the network affects the size of the ring. Therefore, the maximum size of the storage available for the keys represents a limit to the size of the network.
The intermediate cases between combinatorial design and the global master key are characterized by equations that depend on specific combinatorial design strategy. With the SBIBD strategy, in the deterministic predeployment key distribution with ring redundancy t r , the parameters are:
r = 4 n t r 3 + 1 2 ,
p = n t r ,
and
t k = t r r

4. Analysis and Evaluation

This section analyzes the properties of deterministic predeployment key distribution according to its configurations.
We shall assume that an adversary can perform a replay attack and eavesdrop on all the links of the network. An adversary can also capture a node and find all the secret information from its memory.

4.1. Resilience

One of the greatest risks in a WSN is that some nodes are compromised, and their secret material is used to attack other nodes. The strength of a scheme against this attack is called resilience. In particular, it is of special interest the resilience against eavesdropping, which is evaluated according to the quantity of links that an adversary can eavesdrop after compromising a specific amount of nodes.
k = x / t r min ( x , n / t r ) n / t r k k t r x i = x / t r k 1 ( 1 ) k i k i i t r x ( k t r x ) ( n k t r ) + k t r x 2 + k ( n t r k ) t r 2 n t r 1 n x n x 2
k = x / t r max ( x , n / t r ) ( n / t r k k t r x i = x / t r k 1 ( 1 ) k i k i i t r x n x · · i = max ( 1 , r 2 r ( r 1 ) k ) r 2 2 r + 1 P ( r , k , i ) r 2 r + 1 k · n 2 r 2 r + 1 i r 2 r + 1 x ( n 1 ) + x 2 n x 2 )
The quantity of links that can be eavesdropped by an adversary with one key, is always t k 2 . This value represents the quantity of links based on each key. The equations are more complicated if some nodes with their rings are compromised. The equations must consider how many keys can be present in more than one compromised ring, and that the links of the compromised nodes are no longer active and so they must not be considered. The formulas to compute the probability that a link is compromised, i.e., the average percentage of compromised links, in the deterministic predeployment key distribution scheme are (7) and (8), for the minimum key redundancy and for SBIBD configuration, respectively. With the introduction of redundancy, it is possible that an adversary compromises identical nodes. However, only different rings provide new secret material to the adversary. Therefore, by considering x compromised nodes, both formulas start with a summation from x / t r to min ( x , n / t r ) which represents the minimum and the maximum quantity of compromised rings (k), respectively. In fact, t r corresponds to the quantity of nodes with the same ring. The first part inside the summation represents the probability that exactly k rings are compromised. It is computed as n / t r k k t r x i = x / t r k 1 ( 1 ) k i k i i t r x n x 1 . The denominator of this fraction ( n x ) represents the number of possible groups of x compromised nodes. The first binomial represents the number of possible groups of k different rings. The second element of the numerator computes the number of possible groups of x nodes with k different rings among the k t r nodes that share those rings. This result is computed as a difference. Since this formula does not guarantee that at least a node per ring is present, the subtrahend is the summation of all the possible groups of x nodes that are included in less than k rings. The summation is alternatively positive and negative since each superior group redundantly includes all the smaller groups. The result of the described part of the formulas represents the probabilistic weight that will be multiplied by the corresponding quantity of compromised links. Therefore, always considering one compromised link, the results of (7) and (8) would be 1.
The subsequent part of the formulas depends on the considered scheme. With the minimum key redundancy configuration, ( k t r x ) represents the quantity of not-compromised nodes with a ring identical to a compromised one. Each of these nodes has n k t r possible links with a node with a not-compromised ring. All these n k t r links are compromised. Moreover, all the k t r x 2 links among the not-compromised nodes with a compromised ring are compromised. Finally, k ( n t r k ) t r 2 n t r 1 1 computes the quantity of links among the nodes with the same ring that randomly selected a compromised key. In details, the quantity of not-compromised rings ( n t r k ) is multiplied by the number of links per ring t r 2 , multiplied by the quantity of compromised keys per ring k, divided by the quantity of keys per ring n t r 1 . The final result is divided by n x 2 which is the number of links among all the not-compromised nodes.
The first part of (8) is identical to the first part of (7). Also in this case the second part, on the second line, computes the number of compromised links.
The index of the initial summation is i, which represents the quantity of keys not compromised by the adversary. The part of the formula on the second line computes the probability that i has a specific value. The minimum value corresponds to r 2 r ( r 1 ) k , since the quantity of different rings n t r = p = r 2 r + 1 and since with k compromised rings, the maximum number of compromised keys is the minimum between p = r 2 r + 1 and ( ( r 1 ) k + 1 ) , which represents the number of keys compromised by a set rings that share the same key (i.e., among all the compromised keys only one is repeated, and the number of different keys is maximum). The maximum value is ( r 2 2 r + 1 ), which corresponds to the number of not-compromised keys when one ring is compromised. The first fraction within the summation computes the probability of the current value of i. The numerator is P ( r , k , i ) which is a function that computes the quantity of groups of k compromised rings compliant with i not-compromised keys. This value is divided by the total quantity of groups of k compromised rings. The value of function P ( ) is computed through tables. The tables for 3 r 6 are reported in Appendix A. The last part of the formula is the fraction of compromised links. The denominator n x 2 computes the number of possible links between not-compromised nodes. The first part of the numerator is the total quantity of links n 2 multiplied by the number of compromised keys ( r 2 r + 1 i ) and divided by the total number of keys ( r 2 r + 1 ) . The result corresponds to the quantity of compromised links, but it also counts the links with compromised nodes. Therefore, the ( n 1 ) links of the x compromised nodes, minus the x 2 links among the compromised nodes that would be counted two times, are subtracted.

4.2. Experimental Analysis

To provide a clear idea of the properties of the deterministic predeployment key distribution, the resilience of some configurations has been computed and plotted.
Figure 1 shows the level of resilience for a network composed by 84 nodes. The number 84 was selected since it is perfectly compliant with all the tested configurations. Each curve represents a configuration. The graph shows the [0,1] ratio of compromised links according to the number of compromised nodes. As expected, for all the curves, as the number of compromised nodes increases, the ratio of compromised links increases too. The continuous lines are referred to configurations with r = 4 , fine dots are referred to r = 3 , while sparse dots r = 2 . The ring redundancy is computed according to r and n. Both for the minimum key redundancy and for SBIBD configuration, as r increases the ratio of compromised links decreases. By comparing the minimum key redundancy configuration to SBIBD configuration, it is observed that SBIBD always provides a better level of resilience. Only when r = 2 the two curves are identical. However, this is a special case, such as for r = 1 , since both the approaches generate the same key distribution.
A representation similar to the previous one is presented in Figure 2. However, in this case, the size of the network is not constant. For each value of r, the minimum value of n compliant with the two approaches was selected. Therefore, it is not possible to directly compare the configurations with different values of r. However, it is possible to observe that all the general properties showed by the previous chart are confirmed.
The resilience provided by a configuration with a fixed value of r on networks with various sizes is shown in Figure 3. Each curve is matched to a distribution strategy and to a specific number of compromised nodes. The graph shows the [0,1] ratio of compromised links according to the number of nodes in the network. It is observed that the size of the network only provides a slight decrease in the resilience, while each curve is quite stable.
To provide a whole overview on the contribution of r and t r on the resilience, Figure 4 shows the [0,1] ratio of compromised links according to the value of t r . When the values of t r are very low, there is a visible variation in the level of resilience. However, the ratio of compromised links increases always more slowly and for high value of t r the difference is negligible. This result is because of the links of the compromised nodes. These links are considered not existing, since they are no more used by the nodes of the network, but they cannot be eavesdropped, since the adversary directly use them. When t r is high, the adversary gains an advantage by eavesdropping on all the links of the nodes identical to the compromised ones. However, if t r is small, the relative weight of the links of the compromised nodes is higher, and the other identical nodes are lower.
To evaluate the performance of a redundant scheme within the key-management scenario, SBIBD with r = 6 is compared to EG with the same ring size. EG does not guarantee a full connectivity, since some nodes could share no common keys, so its connectivity is imposed higher than 0.99. In order to reach this connectivity level the value of p must be properly set. The formula that computes the connectivity of EG is (9).
0.99 < p r r p r = ! ( p r ) ! ( p 2 r ) ! r ! ( p ) ! ( p r ) ! r = 2 ! ( p r ) ! ( p 2 r ) ! ( p ) = Π i = 0 r 1 p r i p i
According to r = 6 the configuration of EG that guarantees the best resilience is p = 18 , while in redundant SBIBD p = 31 . By using the formula of resilience for EG presented in [20] it is possible to compare these schemes. The comparison is shown in Figure 5. It is possible to observe that the redundant scheme provides a better level of resilience.

4.3. Validation

A simulator has been developed to validate the proposed formulas. The simulator generates a set of rings of keys compliant with the requirements. Then, it randomly selects a specific quantity of nodes that are considered compromised. Finally, some links are checked to verify if the keys that they use are compromised.
In particular, for every tested configuration 10 4 sets of rings have been selected and 10 4 links per selected set have been checked. The results validated the correctness of the formulas. Figure 6 shows some examples of comparison between the results provided by the theoretical formulas and the simulations. The relative difference is always lower than 3 × 10 3 , and it is attributed to the statistical error. As a further proof, Figure 7 compares the curve obtained with r = 4 , with the same configuration, but in this case the double of the sets of rings are selected and the double of the links per set are selected. It is possible to observe that the new curve is not steady, but the picks are strongly reduced.

5. Conclusions

In this paper, an investigation on the use of redundancy for key management in WSNs has been presented. Thanks to redundancy, an upper bound to the maximum quantity of nodes due to memory limit can be broken. The analysis provided analytical formulas to compute the effects of redundancy on resilience. Moreover, the proposed formulas can be also applied without redundancy. The correctness of the results has been validated through simulations. The analysis also showed that the minimum key redundancy configuration provides a lower level of resilience with respect to the SBIBD configuration. The initial increase of the level of redundancy produces a decrease in the resilience, but then the level becomes stable. Therefore, the redundant schemes scale well on very large networks.

Author Contributions

F.G. provided the main idea and conducting the research and investigation process. B.M. worked on the writing and editing of the paper, while M.R. supervised the whole activity.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
WSNWireless sensor network
PGKPlain global key scheme
FPWKFull pairwise keys scheme
SBIBDSymmetric Balanced Incomplete Block Design

Appendix A. Tables

The tables in this appendix correspond to formula P ( r , k , i ) . Each table reports the quantity of groups of k compromised rings compliant with i not-compromised keys for a specific value of r. Table A1, Table A2 and Table A3, correspond to r = 3 , r = 4 and r = 5 , respectively. To improve the layout, the case with r = 6 is split in two tables, Table A4 and Table A5. A small part of the last two tables is repeated.
Table A1. r = 3.
Table A1. r = 3.
k ∖ i10
3287
4728
Table A2. r = 4.
Table A2. r = 4.
k ∖ i43210
323452000
40234468013
500468702117
60078936702
70004681248
80001171170
900013702
Table A3. r = 5.
Table A3. r = 5.
k ∖ i9876543210
3112021000000000
4002520336001050000
5000100810,080756016800021
6000168018,48022,68012,6000336
700000252031,92055,44023,5202880
800000010,29073,08093,24026,880
9000000112042,840151,20098,770
10000000013,860140,448198,408
110000000252086,688263,508
12000000021037,800255,920
130000000011,760191,730
14000000002520113,760
150000000033653,928
16000000002120,328
The rows of the tables corresponding to low values and high values of k are not reported. If k = 1 , independently from the compromised ring, then i = p r = r 2 2 r + 1 . If k = 2 , independently from the pair of compromised nodes, then i = p 2 r + 1 = r 2 3 r + 2 . If the value of k is higher than the values reported in the tables, then i = 0 .
As an example, we shall observe Table A1, corresponding to r = 3 . If 3 rings are compromised, then among the 35 possible combinations of 3 rings over 7, there are 28 combinations of rings that involve one not-compromised key, and 7 combinations of rings that involve zero not-compromised keys.
Table A4. r = 5, part I.
Table A4. r = 5, part I.
k ∖ i1615141312111098765
338756200000000000
400015,50015,500046500000
50000018,60093,00046,50011,62500186
6000000310062,000325,500232,500108,5000
Table A5. r = 5, part II.
Table A5. r = 5, part II.
k ∖ i876543210
6325,500232,500108,5000465000031
746,500434,0001,100,500744,000257,30046,50000775
8046,500697,5002,522,6252,938,8001,302,000372,00009300
90 0093,0001,441,5005,894,6507,579,5004,185,000879,62586,800
10003100279,0004,014,96513,981,00017,042,2507,830,6001,201,250
1100018,6001,302,00012,378,30032,968,50029,806,5008,198,415
1200002170006,466,60037,874,25065,193,00031,369,675
13000015,5002,173,10029,434,50095,759,00078,870,975
1400000474,30016,600,500103,555,500144,552,225
150000062,6207,021,50087,100,700206,355,375
160000038752,241,30058,838,000239,457,020
17000000530,10032,468,625232,183,800
1800000088,35014,725,000191,439,725
1900000093005,471,500135,639,725
200000004651,646,10083,025,750
210000000392,15043,960,015
22000000071,30020,088,775
23000000093007,879,425
2400000007752,628,800
25000000031736,250

References

  1. Ball, M.G.; Qela, B.; Wesolkowski, S. A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks. In Recent Advances in Computational Intelligence in Defense and Security; Abielmona, R., Falcon, R., Zincir-Heywood, N., Abbass, H.A., Eds.; Springer International Publishing: Cham, Switzerland, 2016; pp. 663–693. [Google Scholar]
  2. Badia-Melis, R.; Ruiz-Garcia, L.; Garcia-Hierro, J.; Villalba, J.I.R. Refrigerated Fruit Storage Monitoring Combining Two Different Wireless Sensing Technologies: RFID and WSN. Sensors 2015, 15, 4781–4795. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Wang, X.; Matetić, M.; Zhou, H.; Zhang, X.; Jemrić, T. Postharvest Quality Monitoring and Variance Analysis of Peach and Nectarine Cold Chain with Multi-Sensors Technology. Appl. Sci. 2017, 7, 133. [Google Scholar] [CrossRef]
  4. Alvarez, R.; Caballero-Gil, C.; Santonja, J.; Zamora, A. Algorithms for Lightweight Key Exchange. Sensors 2017, 17, 1517. [Google Scholar] [CrossRef] [PubMed]
  5. Shim, K. A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2016, 18, 577–601. [Google Scholar] [CrossRef]
  6. Gandino, F.; Celozzi, C.; Rebaudengo, M. A Key Management Scheme for Mobile Wireless Sensor Networks. Appl. Sci. 2017, 7, 490. [Google Scholar] [CrossRef]
  7. Simplício, M.A., Jr.; Barreto, P.S.; Margi, C.B.; Carvalho, T.C. A survey on key management mechanisms for distributed Wireless Sensor Networks. Comput. Netw. 2010, 54, 2591–2612. [Google Scholar] [CrossRef]
  8. He, X.; Niedermeier, M.; de Meer, H. Dynamic key management in wireless sensor networks: A survey. J. Netw. Comput. Appl. 2013, 36, 611–622. [Google Scholar] [CrossRef]
  9. Eschenauer, L.; Gligor, V. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, Washington, DC, USA, 18–22 November 2002; pp. 41–47. [Google Scholar] [CrossRef]
  10. Chan, H.; Perrig, A.; Song, D. Random key predistribution schemes for sensor networks. In Proceedings of the Symposium on Security and Privacy, Berkeley, CA, USA, 11–14 May 2003; pp. 197–213. [Google Scholar] [Green Version]
  11. Colbourn, C.J.; Dinitz, J.H. Handbook of Combinatorial Designs; CRC Press: Boca Raton, FL, USA, 2006. [Google Scholar]
  12. Martin, K.M. On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. In Coding and Cryptology; Chee, Y.M., Li, C., Ling, S., Wang, H., Xing, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 124–145. [Google Scholar]
  13. Çamtepe, S.A.; Yener, B. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In Computer Security—ESORICS 2004; Samarati, P., Ryan, P., Gollmann, D., Molva, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 293–308. [Google Scholar]
  14. Camtepe, S.A.; Yener, B. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. IEEE/ACM Trans. Netw. 2007, 15, 346–358. [Google Scholar] [CrossRef] [Green Version]
  15. Srinivasa, K.G.; Poornima, V.; Archana, V.; Reshma, C.; Venugopal, K.R.; Patnaik, L.M. Combinatorial Approach to Key Generation using Multiple Key Spaces for Wireless Sensor Networks. In Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, Chennai, India, 14–17 December 2008; pp. 279–284. [Google Scholar] [CrossRef]
  16. Lee, J.; Stinson, D.R. A combinatorial approach to key predistribution for distributed sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 13–17 March 2005; Volume 2, pp. 1200–1205. [Google Scholar] [CrossRef]
  17. Ruj, S.; Roy, B. Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks. In Parallel and Distributed Processing and Applications; Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., de Mello, R.F., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 431–445. [Google Scholar]
  18. Bechkit, W.; Challal, Y.; Bouabdallah, A.; Tarokh, V. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2013, 12, 948–959. [Google Scholar] [CrossRef] [Green Version]
  19. Ruj, S.; Nayak, A.; Stojmenovic, I. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications. IEEE Trans. Comput. 2013, 62, 2224–2237. [Google Scholar] [CrossRef] [Green Version]
  20. Gandino, F.; Ferrero, R.; Rebaudengo, M. A Key Distribution Scheme for Mobile Wireless Sensor Networks: q - s -Composite. IEEE Trans. Inf. Forensics Secur. 2017, 12, 34–47. [Google Scholar] [CrossRef]
Figure 1. Resilience of the two approaches with specific numbers of keys per ring (written in the label), with 84 nodes.
Figure 1. Resilience of the two approaches with specific numbers of keys per ring (written in the label), with 84 nodes.
Cryptography 02 00040 g001
Figure 2. Resilience with various networks, of the two approaches with specific numbers of keys per ring (written in the label).
Figure 2. Resilience with various networks, of the two approaches with specific numbers of keys per ring (written in the label).
Cryptography 02 00040 g002
Figure 3. Resilience with various networks, of the two approaches with 6 keys per ring according to specific numbers of compromised nodes (written in the label).
Figure 3. Resilience with various networks, of the two approaches with 6 keys per ring according to specific numbers of compromised nodes (written in the label).
Cryptography 02 00040 g003
Figure 4. Resilience with various networks, of SBIBD with 6 keys per ring with X compromised nodes.
Figure 4. Resilience with various networks, of SBIBD with 6 keys per ring with X compromised nodes.
Cryptography 02 00040 g004
Figure 5. Resilience with various networks, of SBIBD with 6 keys per ring with X compromised nodes.
Figure 5. Resilience with various networks, of SBIBD with 6 keys per ring with X compromised nodes.
Cryptography 02 00040 g005
Figure 6. Relative difference between theoretical formulas and simulations.
Figure 6. Relative difference between theoretical formulas and simulations.
Cryptography 02 00040 g006
Figure 7. Relative difference between theoretical formulas and simulations with r = 4.
Figure 7. Relative difference between theoretical formulas and simulations with r = 4.
Cryptography 02 00040 g007

Share and Cite

MDPI and ACS Style

Gandino, F.; Montrucchio, B.; Rebaudengo, M. Redundancy in Key Management for WSNs. Cryptography 2018, 2, 40. https://doi.org/10.3390/cryptography2040040

AMA Style

Gandino F, Montrucchio B, Rebaudengo M. Redundancy in Key Management for WSNs. Cryptography. 2018; 2(4):40. https://doi.org/10.3390/cryptography2040040

Chicago/Turabian Style

Gandino, Filippo, Bartolomeo Montrucchio, and Maurizio Rebaudengo. 2018. "Redundancy in Key Management for WSNs" Cryptography 2, no. 4: 40. https://doi.org/10.3390/cryptography2040040

Article Metrics

Back to TopTop