Performance Evaluation of Key Management Schemes in Wireless Sensor Networks

Wireless sensor networks usually consist of a large number of ultra-small autonomous devices. Each device, called sensor node, is battery powered and equipped with integrated sensors, a data processing unit, and a short-range radio communication unit. Sensor nodes are significantly constrained in terms of energy, memory, and computational capacity. Wireless sensor networks are being deployed in wide variety of applications, including military sensing and tracking, environment monitoring, patient monitoring and tracking, smart environments, etc. When a wireless sensor network is deployed in such hostile environment, security becomes an extremely important issue. Confidentiality, authenticity, availability, and integrity are typical security goals for wireless sensor networks. Providing these goals to secure communication among sensor nodes typically depends on the use of cryptographic schemes. When employing a cryptographic scheme, a key management service is always required. This paper investigates the most important key management schemes in wireless sensor networks. Namely, single network-wide key scheme, pairwise key establishment scheme, random key predistribution, and Q-composite random key predistribution schemes are explained in detail. These key management schemes are evaluated using OMNET++ simulator and extensive simulation results are presented. 

___

  • National Intelligence Council, Mapping the Global Future: Report of the National Intelligence Council's 2020 Project, (2004).
  • Ammari H. M., “Challenges and Opportunities of Connected k-Covered Wireless Sensor Networks From Sensor Deployment to Data Gathering”, Studies in Computational Intelligence, vol. 215, Springer, (2009).
  • Karl H., Willig A., “Protocols and Architectures for Wireless Sensor Networks”, John Wiley & Sons, (2007).
  • Yick J., Mukherjee B., Ghosal D., "Wireless sensor network survey," Computer Networks, 52, pp. 2292–2330, (2008).
  • Akyildiz I. F, Vuran M. C., “Wireless Sensor Networks”, John Wiley & Sons Ltd., (2010).
  • Alemdar, M. Ibnkahla, “Wireless sensor networks: applications and challenges”, in Proceedings of the Ninth Processing and Its Applications (ISSPA 2007), IEEE Computer Society, Washington, DC, USA, (2007). on Signal
  • Arampatzis T., Lygeros J., Manesis S., “A survey of applications of wireless sensors and wireless sensor networks”, in Proceedings of the 2005 IEEE International Symposium on Intelligent Control Mediterranean Automation, Washington, DC, USA, (2005). Computer Society,
  • Xiao Y., Rayi V., Sun B., Du X., Hu F., Galloway M., “A survey of key management schemes in wireless Communications, 30(11-12): 2314-2341, (2007). Computer
  • Zhang J., Varadharajan V., “Wireless sensor network key management survey and taxonomy”, Journal of Network and Computer Applications, 33(2): 63-75, (2010).
  • Hartung C., Balasalle J., Han R., “Node Compromise in Sensor Networks: The Need for Secure Systems”, Department of Computer Science University of Colorado at Boulder Technical Report CU-CS-990-05, Jan. (2005).
  • Stallings W. “Cryptography and Network Security: Principles and practices” 4th edition, Prentice Hall, (2006).
  • Yong W., Garhan A., Byrav R. “A Survey of Security Issues in Wireless Sensor Networks” IEEE Communications Society, V.8, No. 2, (2006).
  • Su Z., Lin C., Feng F. J., Ren F. Y., “Key Management Schemes and Protocols for Wireless Sensor Networks”, Journal of Software, Beijing: Science Press, pp. 1218-1231, (2007).
  • Silva R. M. S., Pereira N. S. A., “Chaos Based Key Management Architecture for Wireless Sensor Networks”, Networks and Application Conference [ATNAC 2006], Melbourne, Australia, Dec. 4-6, (2006).
  • Çamtepe S., Yener B., “Key distribution mechanisms for wireless sensor networks: a survey”, Technical report, Rensselaer Polytechnic Institute, (2005).
  • Eschenauer L., Gligor V., “A key-management scheme for distributed sensor networks”, 9th ACM Conference on Computer and Communication Security, (2002).
  • Chan H., Perrig A., Song D., “Random Key Predistribution for Sensor Networks”, IEEE Symposium on Security and Privacy, (2003).
  • Du W., Deng J., Yunghsiang S., Varshney P., “A Pairwise Key Predistribution Scheme for Wireless Sensor Network”, In Proceedings of the 10th ACM Communications Security (CCS), Washington D.C., Oct. 27-31, (2003). Computer and
  • Liu D., Ning P., “Location-Based Pairwise Key Establishments for Relatively Static Sensor Networks”, 2003 ACM Workshop Security of Ad Hoc and Sensor Networks (SASN03), Oct. 31, (2003).
  • Du W., Deng J., Han Y., Chen S, Varshney P., “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge”, IEEE INFOCOM 04, Mar. 7-11, (2004).
  • Liu D., Ning P., “Establishing Pairwise Keys in Distributed Sensor Networks”, To appear in the 10th ACM Conference on Computer and Communications Security (CCS03), Washington D.C., October, (2003).
  • Dong S., Bing M., Review of Key Management Mechanisms in Wireless Sensor Networks, Vol. 32, No. 6, Nov. (2006).
  • Spencer J., “The Strange Logic of Random Graphs, Algorithms and Combinatorics”, Springer, (2000).
  • İnternet: OMNET++, http://www.omnetpp.org.
  • Drytkiewicz W., Sroka S., Handziski V., Köpke A., Karl H., “A Mobility Framework for OMNeT++”, Jan. 22, (2003).
  • Vargo A., Hornig R. “An Overview Of The Omnet++ Simulation Environment”, Mar. (2008).
  • Xian X., Shi W., Huang H., “Comparison of OMNET++ and other simulator for WSN simulation”, Jun. (2008).
  • Wang S., Liu K.Z., Hu F.P., “Simulation of Wireless Sensor Networks Localization with OMNeT”, Mobile Technology, Applications and Systems, 2005 2nd International Conference on, Nov. (2005).