Skip to main content
Log in

Implementation of key predistribution scheme in WSN based on binary Goppa codes and Reed Solomon codes with enhanced connectivity and resiliency

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Establishing secure transmissions of messages among the resource limited sensor nodes in wireless sensor network (WSN) is a critical issue and requires secret keys to be established among the communicating nodes. Key predistribution is the most commonly used technique and whereby secret keys are preloaded to the sensor nodes before their deployment into a hostile region. A WSN can be structured or unstructured, and sensor nodes may be deployed in an ad-hoc manner or pre-planned manner into the target field. As sensor nodes are low-cost electronic devices equipped with data processing, limited storage, communication and computation power, connectivity, and resiliency are the major focus in designing key predistribution scheme (KPS) for WSNs. Furthermore, we also expect the KPS to be scalable, enabling insertion of a set of new nodes in WSN at any point of time without altering the key setup of the already existing nodes. Combinatorial design is a widely used mathematical tool for the KPS. However, most of the KPS developed by using combinatorial design are not scalable. In this article, rather than using combinatorial techniques, we employ a code-based approach and design a new method for key predistribution by building a communication model and a connectivity model. We exploit the Reed Solomon code to establish our communication model, integrate the binary Goppa code to derive our connectivity model, and skillfully blend these two models to construct our code-based KPS. A C implementation of our KPS confirms the significant performance gain over the existing similar works. Additionally, nodes in our KPS are all self-dependent for communication and do not rely on cluster heads. Furthermore, we have control over the choice of the parameters in the underlying codes which makes our KPS flexible. To be specific, prior knowledge of additional node deployment increases the scalability of our connectivity model. By suitably choosing the parameters of the Goppa code at prior, we can accommodate extra nodes. More interestingly, our communication model is scalable without any previous knowledge of deployment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Ahlawat P, Dave M (2019) Key management in WSN security: an attacker’s perspective. In: Handbook of research on the IoT, cloud computing, and wireless network optimization, IGI Global, pp 303–325

  • Al-Shurman M, Yoo S-M (2006) Key pre-distribution using mds codes in mobile ad hoc networks. In: null, IEEE, pp 566–567

  • Camtepe SA, Yener B (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Computer security–ESORICS 2004, Springer, New York, pp 293–308

  • Camtepe SA, Yener B (2005) Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Troy, New York, Technical report, pp 05–07

  • Chakrabarti D, Maitra S, Roy B (2005) A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. In: ISC, volume 3650, Springer, New York, pp 89–103

  • Chakrabarti D, Maitra S, Roy B (2006) A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. Int J Inf Secur 5(2):105–114

    Article  MATH  Google Scholar 

  • Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Security and privacy, 2003. Proceedings. 2003 symposium on, IEEE, pp 197–213

  • Chen C-Y, Chao H-C (2014) A survey of key distribution in wireless sensor networks. Secur Commun Netw 7(12):2495–2508

    Article  Google Scholar 

  • Dalai DK, Sarkar P (2017) Sensornet-a key pre-distribution scheme for distributed sensors using nets. In: SENSORNETS, pp 49–58

  • Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A (2005) A pairwise key predistribution scheme for wireless sensor networks. ACM Trans Inf Syst Secur (TISSEC) 8(2):228–258

    Article  Google Scholar 

  • Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, ACM, pp 41–47

  • Gao Q, Ma W, Luo W (2017) A combinatorial key predistribution scheme for two-layer hierarchical wireless sensor networks. Wirel Pers Commun 96(2):2179–2204

    Article  Google Scholar 

  • Gao Q, Ma W, Luo W (2018) Key predistribution schemes for wireless sensor networks based on combinations of orthogonal arrays. Ad Hoc Netw 73:40–50

    Article  Google Scholar 

  • Hui K (2011) Secure communication of wireless sensor network (WSN) using coding theory. Int J Adv Comput Netw Secur 1:342–346

    Google Scholar 

  • Kavitha T, Sridharan D (2010) Hybrid design of scalable key distribution for wireless sensor networks. Int J Eng Technol 2(2):136

    Google Scholar 

  • Khalid S, Ahmad F, Beg MR (2012) Secure key pre-distribution in wireless sensor networks using combinatorial design and traversal design based key distribution. Int J Smart Sens Ad Hoc Netw (IJSSAN) 1(4)

  • Lee J, Stinson DR (2005a) A combinatorial approach to key predistribution for distributed sensor networks. In: Wireless communications and networking conference, 2005 IEEE, vol 2, pp 1200–1205

  • Lee J, Stinson DR (2005b) Deterministic key predistribution schemes for distributed sensor networks. In: Selected areas in cryptography, Springer, New York, pp 294–307

  • Lee J, Stinson DR (2006) Common intersection designs. J Combin Des 14(4):251–269

    Article  MathSciNet  MATH  Google Scholar 

  • Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inf Syst Secur (TISSEC) 8(1):41–77

    Article  Google Scholar 

  • MacWilliams FJ, Sloane NJA (1977) The theory of error correcting codes, vol 16. Elsevier, Amsterdam

    MATH  Google Scholar 

  • Martin KM (2009) On the applicability of combinatorial designs to key pre-distribution for wireless sensor networks. In: International conference on coding and cryptology, Springer, New York, pp 124–145

  • Merkle RC (1978) Secure communications over insecure channels. Commun ACM 21(4):294–299

    Article  MATH  Google Scholar 

  • Mitra S, Dutta R, Mukhopadhyay S (2012a) A hierarchical deterministic key pre-distribution for WSN using projective planes. In: Ad hoc networks, Springer, New York, pp 16–31

  • Mitra S, Dutta R, Mukhopadhyay S (2012b) Towards a deterministic hierarchical key predistribution for WSN using complementary fano plane. In: Security and privacy in communication networks, Springer, New York, pp 373–388

  • Otoum S, Kantarci B, Mouftah H (2018) Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures. In: 2018 IEEE international conference on communications (ICC), pp 1–6

  • Otoum S, Kantarci B, Mouftah HT (2017a) Detection of known and unknown intrusive sensor behavior in critical applications. IEEE Sens Lett 1(5):1–4

    Article  Google Scholar 

  • Otoum S, Kantarci B, Mouftah HT (2017b) Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. In: 2017 IEEE international conference on communications (ICC), pp 1–6

  • Otoum S, Kantarci B, Mouftah HT (2017c) Mitigating false negative intruder decisions in WSN-based smart grid monitoring. In: 2017 13th International wireless communications and mobile computing conference (IWCMC), pp 153–158

  • Otoum S, Kantarci B, Mouftah HT (2019) On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw Lett

  • Paterson MB, Stinson DR (2014) A unified approach to combinatorial key pre-distribution schemes for sensor networks. Designs, codes and cryptography, pp 1–25

  • Ren K, Zeng K, Lou W (2006) A new approach for random key pre-distribution in large-scale wireless sensor networks. Wirel Commun Mob Comput 6(3):307–318

    Article  Google Scholar 

  • Ruj S, Roy B (2007) Key predistribution using partially balanced designs in wireless sensor networks. In: Parallel and distributed processing and applications, Springer, New York, pp 431–445

  • Ruj S, Roy B (2008) Key predistribution schemes using codes in wireless sensor networks. In: Information security and cryptology, Springer, New York, pp 275–288

  • Sarkar P, Saha A, Chowdhury MU (2010) Secure connectivity model in wireless sensor networks (WSN) using first order reed-muller codes. In: Mobile adhoc and sensor systems (MASS), 2010 IEEE 7th international conference on, IEEE, pp 507–512

  • Sengupta J, Ruj S, Bit SD (2019) End to end secure anonymous communication for secure directed diffusion in IoT. In: Proceedings of the 20th international conference on distributed computing and networking, ACM, pp 445–450

  • Sengupta J, Ruj S, Das Bit S (2018) An efficient and secure directed diffusion in industrial wireless sensor networks. In: Proceedings of the 1st international workshop on future industrial communication networks, ACM, pp 41–46

  • Zhao J (2017) Probabilistic key predistribution in mobile networks resilient to node-capture attacks. IEEE Trans Inf Theory 63(10):6714–6734

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chinmoy Biswas.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Biswas, C., Dutta, R. Implementation of key predistribution scheme in WSN based on binary Goppa codes and Reed Solomon codes with enhanced connectivity and resiliency. J Ambient Intell Human Comput 14, 5801–5816 (2023). https://doi.org/10.1007/s12652-020-01869-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01869-4

Keywords

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy