A Lightweight Key Negotiation and Authentication Scheme for Large Scale WSNs

  • Mohammad Tehseen
  • Huma Javed
  • Ishtiaq Hussain Shah
  • Sheeraz Ahmed
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)


Wireless sensor networks (WSNs) are being used as remote monitoring and control systems in a number of industries, including health care, defense, agriculture, and disaster management. To ensure that their applications operate reliably, the requirements for the security and integrity of data have increased. Because WSNs are operating as backbone networks, there is a strong need to examine the security of these networks. However, the lack of administration infrastructure at the network level and scarce resources such as processing, power, and storage have made it challenging to find a proper security solution. Among the currently available solutions, single master key-based schemes have gained considerable popularity due to their lower communicational and computational burdens. Recent investigations have shown that these schemes have major drawbacks because of their susceptibility to attacks that involve the physical capture and tampering of nodes. If not handled properly, these attacks can compromise the network and cause a catastrophic situation. In this chapter, a new scheme is proposed: a lightweight system for key exchange and authentication. This scheme also contains countermeasures against physical capturing and tampering attacks. The results obtained from a simulation indicate that the scheme performs well with regard to the utilization of memory and power.


Wireless sensor network (WSN) Hashes Data integrity Public key cryptography 


  1. 1.
    Dargie, W., & Zimmerling, M. (2007). Sensor networks in the context of developing countries. In The 3rd IFIP World Information Technology Forum (WITFOR). Addis Ababa, Ethiopia.Google Scholar
  2. 2.
    Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRefGoogle Scholar
  3. 3.
    Stajano, F. (2002). Security for ubiquitous computing. Chichester, UK: Wiley.CrossRefGoogle Scholar
  4. 4.
    Ojha, T., Misra, S., & Raghuwanshi, N. S. (2015). Wireless sensor networks for agriculture: The state-of-the-art in practice and future challenges. Computers and Electronics in Agriculture, 118, 66–84.CrossRefGoogle Scholar
  5. 5.
    Batista, N. C., Melício, R., Matias, J. C. O., & Catalão, J. P. S. (2013). Photovoltaic and wind energy systems monitoring and building/home energy management using ZigBee devices within a smart grid. Energy, 49, 306–315.CrossRefGoogle Scholar
  6. 6.
    Zhou, H., & Goold, B. (2015). A domestic Adaptable Infant Monitoring System using wireless sensor networks. In IEEE 34th International Performance Computing and Communications Conference (IPCCC) (pp. 1–2).Google Scholar
  7. 7.
    Lin, B. S., Wong, A. M., & Tseng, K. C. (2016). Community-based ECG monitoring system for patients with cardiovascular diseases. Journal of Medical Systems, 40(4), 1–12.Google Scholar
  8. 8.
    Gome, A., Magno, M., Lagadec, M. F., & Benini, L. (2017). Precise, energy-efficient data acquisition architecture for monitoring radioactivity using self-sustainable wireless sensor nodes. IEEE Sensors Journal, 18(1), 459–469.CrossRefGoogle Scholar
  9. 9.
    Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. In Communications of the ACM (pp. 53–57). New York: ACM.Google Scholar
  10. 10.
    Prasanna, S., & Rao, S. (2012). An overview of wireless sensor networks applications and security. International Journal of Soft Computing and Engineering (IJSCE), 2(2), 2231–2307.Google Scholar
  11. 11.
    Delgado-Mohatar, O., Fúster-Sabater, A., & Sierra, J. M. (2011). A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks, 9, 727–735.CrossRefGoogle Scholar
  12. 12.
    Chan, H., Perrig, A., & Song, D. (2003). Random key pre distribution schemes for sensor networks. In Proceedings of Symposium on Security and Privacy 2003 (pp. 197–213).Google Scholar
  13. 13.
    Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8, 228–258.CrossRefGoogle Scholar
  14. 14.
    Menezes, A. Z., van Oorschot, P. C., & Varstone, S. A. (1997). Handbook of applied cryptography. Boca Raton, FL: CRC Press.zbMATHGoogle Scholar
  15. 15.
    Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2, 500–528.CrossRefGoogle Scholar
  16. 16.
    Lai, B., Hwang, D. D., Kim, S. P., & Verbauwhede, I. (2004). Reducing radio energy consumption of key management protocols for wireless sensor networks. In Proceedings of the 2004 International Symposium on Low Power Electronics and Design (pp. 351–356). New York: ACM.Google Scholar
  17. 17.
    Sojka-Piotrowska, A., & Langendoerfer, P. (2017). Shortening the security parameters in lightweight WSN applications for IoT-lessons learned. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (Vol. 13, pp. 636–641).CrossRefGoogle Scholar
  18. 18.
    Barker, E., Barker, W., Burr, W., Polk, W., & Smid, M. (2007). NIST special publication. NIST Special Publication, 800, 1–142.Google Scholar
  19. 19.
    Gupta, A., & Kuri, J. (2008). Deterministic schemes for key distribution in wireless sensor networks. In 3rd International Conference 2008 on Communication Systems Software and Middleware and Workshop (pp. 452–459). Banglore, India: IEEE.Google Scholar
  20. 20.
    Rautray, R., & Sarangi, I. (2011). A survey on authentication protocols for wireless sensor network. International Journal of Engineering, Science and Technology (IJEST), 3, 4253–4256.Google Scholar
  21. 21.
    Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security CCS-02 (pp. 41–47). New York: ACM.Google Scholar
  22. 22.
    Sangwan, A., Sindhu, D., & Singh, K. (2011). A review of various security protocols in wireless sensor network. International Journal of Computer Technology, 2, 790–797.Google Scholar
  23. 23.
    Anderson, R., Chan, H., & Perrig, A. (2004). Key infection smart trust for smart dust. In Proceedings of the 12th IEEE International Conference 2004 on Network Protocols (pp. 206–215). Cambridge, UK: IEEE.Google Scholar
  24. 24.
    Gupta, S., Verma, H. K., & Sangal, A. L. (2010). Authentication protocol for wireless sensor networks. World Academy of Science, Engineering and Technology, 42, 630–636.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mohammad Tehseen
    • 1
  • Huma Javed
    • 1
  • Ishtiaq Hussain Shah
    • 1
  • Sheeraz Ahmed
    • 2
    • 3
  1. 1.Department of Computer ScienceUniversity of PeshawarPeshawarPakistan
  2. 2.Career Dynamics Research CenterPeshawarPakistan
  3. 3.Iqra National UniversityPeshawarPakistan

Personalised recommendations