Log in

DyClust: A Hybrid Key Management Scheme for Wireless Sensor Network

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Wireless sensor network (WSN) has a variety of applications, differ in size, and are used in a range of environments. Many applications that use WSN need secure communication. During the joining and leaving operations of the node, key management is essential to meet the security objectives in WSN. In multicast WSN, information transmits from one node to another in a cluster via cluster head where information security is an important issue and cryptographic algorithms play vital roles for it. This paper proposes a hybrid security algorithm Dynamic Cluster-Based Group key Management Scheme (DCGKMS) having a blend of secure algorithms RSA and CRT. The proposed DCGKMS proves to be more secure, efficient, and cost-effective on the evaluation parameters commutation, communication, and rekeying cost for dynamic clusters. DCGKMS manages to reduce the key storage at leaving and joining operations. The simulation is being done using NS2 and results are shown in comparison with LKH and OFT with higher efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Availability of Data and Material

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Code Availability

Not applicable.

References

  1. Ahlawat P, Dave M. An attack model based highly secure key management scheme for wireless sensor networks. Procedia Comput Sci. 2018;125:201–7.

    Article  Google Scholar 

  2. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput Netw. 2002;38(4):393–422.

    Article  Google Scholar 

  3. Zhang J, Varadharajan V. Wireless sensor network key management survey and taxonomy. J Netw Comput Appl. 2010;33(2):63–75.

    Article  CAS  Google Scholar 

  4. Johnson D, Hu YC, Maltz D. The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. RFC, 4728. 2007. pp 1–107.

  5. Perkins C, Belding-Royer E, Das S. RFC3561: Ad hoc on-demand distance vector (AODV) routing. USA: RFC Editor; 2003.

  6. Shen AN, Guo S, Chien HY. An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks. In: 2009 IEEE Sarnoff symposium, Princeton, NJ. IEEE; 2009. p. 1–5.

  7. Kumar KN, Nene MJ. Chip-based symmetric and asymmetric key generation in hierarchical wireless sensors networks. In: 2017 International conference on inventive systems and control (ICISC), Coimbatore, India. IEEE; 2017. p. 1–6. https://doi.org/10.1109/ICISC.2017.8068646.

  8. Mahmood Z, Ning H, Ghafoor A. A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors. 2017;17(4):670.

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  9. Dinker AG, Sharma V. Trivariate polynomial based key management scheme (TPB-KMS) in hierarchical wireless sensor networks. In: Ambient communications and computer systems: RACCCS 2017. Singapore: Springer; 2018. p. 283–90.

  10. Bahrami PN, Javadi HH, Dargahi T, Dehghantanha A, Choo KKR. A hierarchical key pre-distribution scheme for fog networks. Concurr Comput: Pract Exp. 2019;31(22): e4776.

    Article  Google Scholar 

  11. Albakri A, Maddumala M, Harn L. Hierarchical polynomial-based key management scheme in fog computing. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE), New York, NY, USA. IEEE; 2018. p. 1593–7. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00231.

  12. Hamsha K, Nagaraja GS. Threshold cryptography based light weight key management technique for hierarchical WSNs. In: Ubiquitous communications and network computing: second EAI international conference, Bangalore, India, February 8–10, 2019, proceedings 2. Berlin: Springer International Publishing; 2019. p. 188–97.

  13. Kumar A, Bansal N, Pais AR. New key pre-distribution scheme based on combinatorial design for wireless sensor networks. IET Commun. 2019;13(7):892–7.

    Article  Google Scholar 

  14. Ge M, Choo KKR, Wu H, Yu Y. Survey on key revocation mechanisms in wireless sensor networks. J Netw Comput Appl. 2016;63:24–38.

    Article  Google Scholar 

  15. Apsara MB, Dayananda P, Sowmyarani CN. A review on secure group key management schemes for data gathering in wireless sensor networks. Eng Technol Appl Sci Res. 2020;10(1):5108–12.

    Article  Google Scholar 

  16. Albakri A, Alshahrani R, Alharbi F, Ahamed SB. Fully homomorphic encryption with optimal key generation secure group communication in Internet of Things environment. Appl Sci. 2023;13(10):6055.

    Article  CAS  Google Scholar 

  17. Muthusamy SK, Thiyagarajan P, Selvaraj L. An enhanced and cost effective group key management scheme for multicast network. J Comput Sci. 2013;9(4):477.

    Article  Google Scholar 

  18. Srivastava V, Tripathi S, Singh K, Son LH. Energy efficient optimized rate based congestion control routing in wireless sensor network. J Ambient Intell Humaniz Comput. 2020;11:1325–38.

    Article  Google Scholar 

Download references

Funding

The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Gunjan Srivastava.

Ethics declarations

Conflict of Interest

The authors declare that they do not have any conflict of interests. This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Security for Communication and Computing Application” guest edited by Karan Singh, Ali Ahmadian, Ahmed Mohamed Aziz Ismail, R S Yadav, Md. Akbar Hossain, D. K. Lobiyal, Mohamed Abdel-Basset, Soheil Salahshour, Anura P. Jayasumana, Satya P. Singh, Walid Osamy, Mehdi Salimi and Norazak Senu.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Srivastava, G., Singh, J.N., Manjul, M. et al. DyClust: A Hybrid Key Management Scheme for Wireless Sensor Network. SN COMPUT. SCI. 5, 269 (2024). https://doi.org/10.1007/s42979-023-02584-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02584-5

Keywords

Navigation