Abstract
Establishing secure transmissions of messages among the resource limited sensor nodes in wireless sensor network (WSN) is a critical issue and requires secret keys to be established among the communicating nodes. Key predistribution is the most commonly used technique and whereby secret keys are preloaded to the sensor nodes before their deployment into a hostile region. A WSN can be structured or unstructured, and sensor nodes may be deployed in an ad-hoc manner or pre-planned manner into the target field. As sensor nodes are low-cost electronic devices equipped with data processing, limited storage, communication and computation power, connectivity, and resiliency are the major focus in designing key predistribution scheme (KPS) for WSNs. Furthermore, we also expect the KPS to be scalable, enabling insertion of a set of new nodes in WSN at any point of time without altering the key setup of the already existing nodes. Combinatorial design is a widely used mathematical tool for the KPS. However, most of the KPS developed by using combinatorial design are not scalable. In this article, rather than using combinatorial techniques, we employ a code-based approach and design a new method for key predistribution by building a communication model and a connectivity model. We exploit the Reed Solomon code to establish our communication model, integrate the binary Goppa code to derive our connectivity model, and skillfully blend these two models to construct our code-based KPS. A C implementation of our KPS confirms the significant performance gain over the existing similar works. Additionally, nodes in our KPS are all self-dependent for communication and do not rely on cluster heads. Furthermore, we have control over the choice of the parameters in the underlying codes which makes our KPS flexible. To be specific, prior knowledge of additional node deployment increases the scalability of our connectivity model. By suitably choosing the parameters of the Goppa code at prior, we can accommodate extra nodes. More interestingly, our communication model is scalable without any previous knowledge of deployment.











Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ahlawat P, Dave M (2019) Key management in WSN security: an attacker’s perspective. In: Handbook of research on the IoT, cloud computing, and wireless network optimization, IGI Global, pp 303–325
Al-Shurman M, Yoo S-M (2006) Key pre-distribution using mds codes in mobile ad hoc networks. In: null, IEEE, pp 566–567
Camtepe SA, Yener B (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Computer security–ESORICS 2004, Springer, New York, pp 293–308
Camtepe SA, Yener B (2005) Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Troy, New York, Technical report, pp 05–07
Chakrabarti D, Maitra S, Roy B (2005) A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. In: ISC, volume 3650, Springer, New York, pp 89–103
Chakrabarti D, Maitra S, Roy B (2006) A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. Int J Inf Secur 5(2):105–114
Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Security and privacy, 2003. Proceedings. 2003 symposium on, IEEE, pp 197–213
Chen C-Y, Chao H-C (2014) A survey of key distribution in wireless sensor networks. Secur Commun Netw 7(12):2495–2508
Dalai DK, Sarkar P (2017) Sensornet-a key pre-distribution scheme for distributed sensors using nets. In: SENSORNETS, pp 49–58
Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A (2005) A pairwise key predistribution scheme for wireless sensor networks. ACM Trans Inf Syst Secur (TISSEC) 8(2):228–258
Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, ACM, pp 41–47
Gao Q, Ma W, Luo W (2017) A combinatorial key predistribution scheme for two-layer hierarchical wireless sensor networks. Wirel Pers Commun 96(2):2179–2204
Gao Q, Ma W, Luo W (2018) Key predistribution schemes for wireless sensor networks based on combinations of orthogonal arrays. Ad Hoc Netw 73:40–50
Hui K (2011) Secure communication of wireless sensor network (WSN) using coding theory. Int J Adv Comput Netw Secur 1:342–346
Kavitha T, Sridharan D (2010) Hybrid design of scalable key distribution for wireless sensor networks. Int J Eng Technol 2(2):136
Khalid S, Ahmad F, Beg MR (2012) Secure key pre-distribution in wireless sensor networks using combinatorial design and traversal design based key distribution. Int J Smart Sens Ad Hoc Netw (IJSSAN) 1(4)
Lee J, Stinson DR (2005a) A combinatorial approach to key predistribution for distributed sensor networks. In: Wireless communications and networking conference, 2005 IEEE, vol 2, pp 1200–1205
Lee J, Stinson DR (2005b) Deterministic key predistribution schemes for distributed sensor networks. In: Selected areas in cryptography, Springer, New York, pp 294–307
Lee J, Stinson DR (2006) Common intersection designs. J Combin Des 14(4):251–269
Liu D, Ning P, Li R (2005) Establishing pairwise keys in distributed sensor networks. ACM Trans Inf Syst Secur (TISSEC) 8(1):41–77
MacWilliams FJ, Sloane NJA (1977) The theory of error correcting codes, vol 16. Elsevier, Amsterdam
Martin KM (2009) On the applicability of combinatorial designs to key pre-distribution for wireless sensor networks. In: International conference on coding and cryptology, Springer, New York, pp 124–145
Merkle RC (1978) Secure communications over insecure channels. Commun ACM 21(4):294–299
Mitra S, Dutta R, Mukhopadhyay S (2012a) A hierarchical deterministic key pre-distribution for WSN using projective planes. In: Ad hoc networks, Springer, New York, pp 16–31
Mitra S, Dutta R, Mukhopadhyay S (2012b) Towards a deterministic hierarchical key predistribution for WSN using complementary fano plane. In: Security and privacy in communication networks, Springer, New York, pp 373–388
Otoum S, Kantarci B, Mouftah H (2018) Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures. In: 2018 IEEE international conference on communications (ICC), pp 1–6
Otoum S, Kantarci B, Mouftah HT (2017a) Detection of known and unknown intrusive sensor behavior in critical applications. IEEE Sens Lett 1(5):1–4
Otoum S, Kantarci B, Mouftah HT (2017b) Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. In: 2017 IEEE international conference on communications (ICC), pp 1–6
Otoum S, Kantarci B, Mouftah HT (2017c) Mitigating false negative intruder decisions in WSN-based smart grid monitoring. In: 2017 13th International wireless communications and mobile computing conference (IWCMC), pp 153–158
Otoum S, Kantarci B, Mouftah HT (2019) On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw Lett
Paterson MB, Stinson DR (2014) A unified approach to combinatorial key pre-distribution schemes for sensor networks. Designs, codes and cryptography, pp 1–25
Ren K, Zeng K, Lou W (2006) A new approach for random key pre-distribution in large-scale wireless sensor networks. Wirel Commun Mob Comput 6(3):307–318
Ruj S, Roy B (2007) Key predistribution using partially balanced designs in wireless sensor networks. In: Parallel and distributed processing and applications, Springer, New York, pp 431–445
Ruj S, Roy B (2008) Key predistribution schemes using codes in wireless sensor networks. In: Information security and cryptology, Springer, New York, pp 275–288
Sarkar P, Saha A, Chowdhury MU (2010) Secure connectivity model in wireless sensor networks (WSN) using first order reed-muller codes. In: Mobile adhoc and sensor systems (MASS), 2010 IEEE 7th international conference on, IEEE, pp 507–512
Sengupta J, Ruj S, Bit SD (2019) End to end secure anonymous communication for secure directed diffusion in IoT. In: Proceedings of the 20th international conference on distributed computing and networking, ACM, pp 445–450
Sengupta J, Ruj S, Das Bit S (2018) An efficient and secure directed diffusion in industrial wireless sensor networks. In: Proceedings of the 1st international workshop on future industrial communication networks, ACM, pp 41–46
Zhao J (2017) Probabilistic key predistribution in mobile networks resilient to node-capture attacks. IEEE Trans Inf Theory 63(10):6714–6734
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Biswas, C., Dutta, R. Implementation of key predistribution scheme in WSN based on binary Goppa codes and Reed Solomon codes with enhanced connectivity and resiliency. J Ambient Intell Human Comput 14, 5801–5816 (2023). https://doi.org/10.1007/s12652-020-01869-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-01869-4