CSIT Analysis of Key Management Schemes for Centralized and Distributed Key Revocation in Wireless Sensor Networks

Authors

  • Taofeek Yusuf Department of Cyber Security Science, Federal University Technology, Minna, Nigeria.
  • Victor Onomza Waziri Department of Cyber Security Science, Federal University Technology, Minna, Nigeria.
  • Morufu Olalere Department of Cyber Security Science, Federal University Technology, Minna, Nigeria.
  • Muhammad Bashir Abdullahi Department of Computer Science, Federal University Technology, Minna, Nigeria.

DOI:

https://doi.org/10.54117/gjpas.v3i1.118

Keywords:

Wireless Sensor Networks;, Key Management Systems;, Key Revocation Schemes;, Node Revocation;, Intrusion Detection Systems.

Abstract

Wireless sensor network (WSN) applications have been utilized for a variety of applications. Such as monitoring environments, military functions, and patient status monitoring. A major challenge in different applications of WSNs is security. This is because they are mostly deployed in a hostile environment, coupled with their constrained resources. Securing data and communication in WSNs requires appropriate cryptographic techniques. This is usually implemented through secure and efficient key management schemes. Research on key management in WSN is a work in progress. In this context, most research works focus on the key establishment and distribution aspect of the key management system. While less attention is devoted to key revocation and renewal techniques. For this reason, network and protocol designers encounter challenges in the design and implementation of the most appropriate schemes for WSN applications. This research work presents an exhaustive review of categories of key revocation schemes in existence. The study focuses on centralized and distributed categories only. A comparative analysis of the security and performance requirements of some selected candidates of centralized and distributed schemes was carried out. The results show that the KRRP scheme is the only solution among the selected candidates that can guarantee end-to-end data secrecy. This is because it merges the capability of private and public key cryptography in its implementation as shown in table 1. Also, the study observed most distributed schemes reviewed did not present energy overheads of process execution despite their complex nature. On the whole, this work outlines a much wider view of key management systems in terms of key revocation functionality and open research issues for the secure and efficient key management system.

References

Ahlawat, P. and Dave, M. (2021). An attack-resistant key pre-distribution scheme for wireless sensor networks. Journal of King Saud University-Computer and Information Sciences, 33(3), 268-280. https://doi.org/10.1016/j.jksuci.2018.03.002

Albakri, A., Harn, L., Song, S. (2019). Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN). Security and communication networks, 2019.

Chaib N, Lagraa N, Yagoubi MB, Lakas A. (2016). SDRP: a secure distributed revocation protocol for vehicular environments. Security and Communication Networks, 9(4), 279-289. https://doi.org/10.1002/sec.561.

Chan, H., Gligor, V. D., Perrig, A., Muralidharan, G. (2005). On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on dependable and secure computing, 2(3), 233-247.

Chao, C. H., Yang, C. F., Lin, P. T., Li, J. S. (2013). Novel distributed key revocation scheme for wireless sensor networks. Security and Communication Networks, 6(10), 1271-1280.

Chinniah P, Krishnamoorthi S. (2019). An Efficient Elliptic Curve based Key Management Scheme for Distributed Sensor Networks. European Journal of Engineering Research and Science, 4(6), 111-116.

Dabhade, V. D. and Alvi, A. S. (2021). Review of wireless sensor network security schemes. In Intelligent Computing and Networking, pp. 41-51. Springer, Singapore. https://doi.org/10.1007/978-981-15-7421-4_4

Dini, G. and Savino, I.M. (2006) An efficient key revocation protocol for wireless sensor networks. In 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'06), pp. 3-pp. IEEE. doi:10.1109/wowmom.2006.23

Doerr, L., Heigl, M., Fiala, D., Schramm, M. (2019). Comparison of energy-efficient key management protocols for wireless sensor networks. In Proceedings of the 1st International Electronics Communication Conference (pp. 21-26).

Eschenauer L, Gligor V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, pp. 41-47. doi:10.1145/586110.586117.

Ferng, H. W., Nurhakim, J., Horng, S. J. (2014). Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wireless networks, 20(4), 625-637.

Gandino, F. and Servetti, A. (2019). Key recoverability in wireless sensor networks. IEEE Access, 7, 164407-164417. doi:10.1109/ACCESS.2019.2952945.

Gautam, A. K., and Kumar, R. (2018). A comparative study of recently proposed key management schemes in the wireless sensor network. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON), pp. 512-517. IEEE

Guermazi, A., Belghith, A., Abid, M., Gannouni, S. (2017). KMMR: An efficient and scalable key management protocol to secure multi-hop communications in large scale wireless sensor networks. KSII Transactions on Internet and Information Systems (TIIS), 11(2), 901-923.

Hegde, M., and Andrew, J. (2023). A Lightweight Authentication Framework for Fault-tolerant Distributed WSN. IEEE Access.

Huanan Z, Suping X, Jiannan W. (2021). Security and application of wireless sensor network. Procedia Computer Science, 183, 486-492. https://doi.org/10.1016/j.procs.2021.02.088

Hussain, S. Z. and Kumar, M. (2021). Secured Key Agreement Schemes in Wireless Body Area Network-A Review. Indian Journal of Science and Technology, 14(24), 2005-2033. https://doi.org/10.17485/IJST/v14i24.1708

Khan, M. A., Nasralla, M. M., Umar, M. M., Iqbal, Z., Rehman, G. U., Sarfraz, M. S., Choudhury, N. (2021). A survey on the noncooperative environment in smart nodes-based Ad Hoc networks: Motivations and solutions. Security and Communication Networks, 2021, 1-17.

Kumar, V., Malik, N., Dhiman, G., Lohani, T. K. (2021). Scalable and storage efficient dynamic key management scheme for wireless sensor network. Wireless Communications and Mobile Computing, 2021, 1-11.

Mall D, Konaté K, Pathan ASK. (2013). On the key revocation schemes in wireless sensor networks. In IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp. 290-297. DOI 10.1109/GreenCom-iThings-CPSCom.2013.66.

Mansour I, Chalhoub G, Lafourcade P (2015) Key management in wireless sensor networks. Journal of sensor and actuator networks, 4(3), 251-273. doi:10.1109/inm.2005.1440863.

Mansour I, Chalhoub G, Lafourcade P, Delobel F. (2014) Secure key renewal and revocation for Wireless Sensor Networks. In 39th Annual IEEE Conference on Local Computer Networks pp. 382-385. IEEE. doi:10.1109/lcn.2014.6925797.

Mehmood, G., Khan, M. S., Waheed, A., Zareei, M., Fayaz, M., Sadad, T., and Azmi, A. (2021). An efficient and secure session key management scheme in wireless sensor network. Complexity, 2021, 1-10.

Moara-Nkwe, K., Shi, Q., Lee, G. M., Eiza, M. H. (2018). A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access, 6, 11374-11387.

Muruganandam, S., Joshi, R., Suresh, P., Balakrishna, N., Kishore, K. H., Manikanthan, S. V. (2023). A deep learning-based feed forward artificial neural network to predict the K-barriers for intrusion detection using a wireless sensor network. Measurement: Sensors, 25, 100613.

Nabavi S.R.and Mousavi S.M. (2018). A review of distributed dynamic key management schemes in wireless sensor networks. J. Comput., 13(1), 77-89. doi:10.17706/jcp.13.1.77-89

Nafi, M., Bouzefrane, S., & Omar, M. (2020). Matrix-based key management scheme for IoT networks. Ad Hoc Networks, 97, 102003.

Nithya, B. (2020). Cluster-based key management schemes in wireless sensor networks: a survey. Procedia Computer Science, 171, 2684-2693.

Nour, B., Khelifi, H., Hussain, R., Mastorakis, S., Moungla, H. (2021). Access control mechanisms in named data networks: A comprehensive survey. Acm computing Surveys (cSuR), 54(3), 1-35.

Omar, M., Belalouache, I., Amrane, S., Abbache, B. (2018). Efficient and energy-aware key management framework for dynamic sensor networks. Computers & Electrical Engineering, 72, 990-1005.

Rahman, M., and Sampalli, S. (2015). An efficient pairwise and group key management protocol for wireless sensor network. Wireless Personal Communications, 84(3), 2035-2053. https://doi.org/10.1007/s11277-015-2546-4

Shamshad, S., Ayub, M. F., Mahmood, K., Kumari, S., Chaudhry, S. A., Chen, C. M. (2022). An enhanced scheme for mutual authentication for healthcare services. Digital Communications and Networks, 8(2), 150-161.

Sheu, R. K., Pardeshi, M. S., & Chen, L. C. (2022). Autonomous Mutual Authentication Protocol in the Edge Networks. Sensors, 22(19), 7632.

Wang Y, Ramamurthy B, Zou X (2007) KeyRev: An efficient key revocation scheme for wireless sensor networks. In IEEE International Conference on Communications (pp. 1260-1265). IEEE. DOI: 10.1109/ICC.2007.213.

Wang, J., Sun, C., Wang, H., Zhao, B., Gong, P. (2022). A CFL-Based Key Management Scheme for Routing-Driven Internet of Things. Security and Communication Networks, 2022.

Wang, Y., Ramamurthy, B., Xue, Y. (2008). A key management protocol for wireless sensor networks with multiple base stations. In 2008 IEEE International Conference on Communications (pp. 1625-1629). IEEE.

Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475-492.

Won, J., Seo, S. H., & Bertino, E. (2017). Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access, 5, 3721-3749.

Xue, X., Shanmugam, R., Palanisamy, S., Khalaf, O. I., Selvaraj, D., Abdulsahib, G. M. (2023). A hybrid cross layer with harris-hawk-optimization-based efficient routing for wireless sensor networks. Symmetry, 15(2), 438.

Yao W, Han S, Li X. (2015). LKH++ based group key management scheme for wireless sensor network. Wireless Personal Communications, 83(4), 3057-3073. DOI 10.1007/s11277-015-2582-0

Zarezadeh, M., and Mala, H. (2019). Determining honesty of accuser nodes in key revocation procedure for MANETs. Mobile Networks and Applications, 24, 903-912.

Zhang, J., Zhang, Q., Li, Z., Lu, X., Gan, Y. (2021). A lightweight and secure anonymous user authentication protocol for wireless body area networks. Security and Communication Networks, 2021, 1-11.

Zhang, S., and Cao, D. (2023). A Blockchain based Provably Secure Anonymous Authentication for Edge Computing-enabled.

Zhang, W., Zhu, S., Cao, G. (2009). Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad hoc networks, 7(6), 1229-1242.

Zhang, X., He, J., Wei, Q. (2011). EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011, 1-11.

Zhang, Y., Shen, Y., & Lee, S. (2010). A cluster-based group key management scheme for wireless sensor networks. In 2010 12th International Asia-Pacific Web Conference (pp. 386-388). IEEE.

Downloads

Published

2024-06-01

How to Cite

Yusuf, T., Onomza Waziri, V., Olalere, M., & Bashir Abdullahi, M. (2024). CSIT Analysis of Key Management Schemes for Centralized and Distributed Key Revocation in Wireless Sensor Networks. Gadau Journal of Pure and Allied Sciences, 3(1), 15–29. https://doi.org/10.54117/gjpas.v3i1.118