Abstract
The main issue for the security of wireless sensor networks (WSNs) is how to allow sensor nodes (SNs) to establish and share cryptographic keys in an energy-efficient, storage-efficient, and authentic manner for their secure data transmission. Furthermost recent studies carried out in this direction is concerned with homogeneous networks in which all sensor has identical characteristics and fundamental administration mechanisms. However, Cluster-based sensor networks have demonstrated better achievements and performance than homogeneous networks because of the several benefits of clustering. This inspired us to propose a secure key-establishment method for cluster-based sensor networks based on symmetric-key cryptography. Since symmetric key cryptography has small energy consumption, they are a great choice to prefer for securing the networks. Even though symmetric key cryptography has high storage needs, this deficiency can be reduced by using suitable methods—evaluating the proposed work that the storage needs are reduced along with reduced energy consumption. The work offers a favorable level of security against various intruders and possible security threats and is additionally scalable than the state-of-the-art techniques.
Similar content being viewed by others
References
Cayirci, E., & Rong, C. (2009). Security in wireless ad hoc and sensor networks. Wiley.
Bhasin, V., Kumar, S., Saxena, P. C., & Katti, C. P. (2020). Security architectures in wireless sensor network. International Journal of Information Technology, 12, 261–272. https://doi.org/10.1007/s41870-018-0103-6
Agrawal, M., Zhou, J., Chang, D. (2019) A survey on lightweight authenticated encryption and challenges for securing industrial iot. In: Security and privacy trends in the industrial internet of things. Springer, pp 71–94.
Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the internet of things. Ad Hoc Networks, 32, 17–31.
Mohamed, R. E., Saleh, A. I., Abdelrazzak, M., & Samra, A. S. (2018). Survey on wireless sensor network applications and energy efficient routing protocols. Wireless Personal Communications, 101, 1019–1055. https://doi.org/10.1007/s11277-018-5747-9
Padmavathi, B., & Kumari, S. R. (2013). A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution. International Journal of Science and Research, 2(4), 170–174.
Prakash, S., & Rajput, A. (2018). Hybrid cryptography for secure data communication in wireless sensor networks. In G. Perez, S. Tiwari, M. Trivedi, & K. Mishra (Eds.), Ambient communications and computer systems. Advances in intelligent systems and computing. Springer.
Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Advanced lightweight encryption algorithms for IoT devices: Survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-017-0494-4
Jain, K., Kumar, A., & Vyas, V. (2020). A resilient steady clustering technique for sensor networks. International Journal of Applied Evolutionary Computation (IJAEC), 11(4), 1–12.
Jain, K., & Kumar, A. (2020). Energy-efficient data-aggregation technique for correlated spatial and temporal data in cluster-based sensor networks. International Journal of Business Data Communications and Networking (IJBDCN), 16(2), 53–68. https://doi.org/10.4018/IJBDCN.2020070103
Jain, K., & Bhola, A. (2018). Data aggregation design goals for monitoring data in wireless sensor net-works. Journal of Network Security Computer Net-works, 4(3), 1–9.
Mizanur Rahman, S., & El-Khatib, K. (2010). Private key agreement and secure communication for heterogeneous sensor networks. Journal of Parallel and Distributed Computing, 70, 858–870.
Shi, Q., Zhang, N., Merabti, M., & Kifayat, K. (2013). Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. Journal of Parallel and Distributed Computing, 73(2), 235–249.
Khemissa, H., Tandjaoui, D., & Bouzefrane, S. (2017). An ultra-lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In S. Bouzefrane, S. Banerjee, F. Sailhan, S. Boumerdassi, & E. Renault (Eds.), Mobile, secure, and programmable networking. MSPN 2017. Lecture Notes in Computer Science. Springer.
Darbandeh, F. G., & Safkhani, M. (2020). A new lightweight user authentication and key agreement scheme for WSN. Wireless Personal Communications, 114, 3247–3269. https://doi.org/10.1007/s11277-020-07527-4
Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable tem-poral-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37–48.
Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A. K., & Choo, K.-K.R. (2018). A three-factor anonymous authentication scheme for wireless sensor networks in inter-net of things environments. Journal of Network and Computer Applications, 103, 194–204.
Mehra, P. S., Doja, M. N., & Alam, B. (2019). Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. International Journal of Communication Systems, 32, e3879. https://doi.org/10.1002/dac.3879
Athmani, S., Bilami, A., & Boubiche, D. E. (2019). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, 92, 789–799.
Mirvaziri, H., & Hosseini, R. (2020). A novel method for key establishment based on symmetric cryptography in hierarchical wireless sensor networks. Wireless Personal Communications, 112, 1–19.
Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02020-z
Khashan, O., Ahmad, R., & Khafajah, N. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks. https://doi.org/10.1016/j.adhoc.2021.1024
Singh, A., Awasthi, A. K., & Singh, K. (2017). Cryptanalysis and improvement in user authentication and key agreement scheme for wireless sensor network. Wireless Personal Communications, 94, 1881–1898. https://doi.org/10.1007/s11277-016-3717-7
Jain, K., & Kumar, A. (2020). An energy-efficient prediction model for data aggregation in sensor network. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-01833-2
Issariyakul, T., & Hossain, E. (2012). Introduction to Network Simulator 2 (NS2). Springer Science+ Business Media. Springer.
Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.
Funding
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, A., Jain, K. An efficient secure key establishment method in cluster-based sensor network. Telecommun Syst 79, 3–16 (2022). https://doi.org/10.1007/s11235-021-00844-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-021-00844-4