µKMS: micro key management system for WSNs

µKMS: micro key management system for WSNs

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Wireless Sensor Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Key management is the basic building block of all the security protocols and is one of the most challenging issues in wireless sensor networks (WSNs). Centralising a trusted key management server is not an appropriate solution in such fully distributed networks. On the other hand, designing a distributed key management system is a challenging task, due to the constrained characteristics of sensor nodes, which are limited in storage, computation, communication, and energy. In the literature, there is a hot research effort on key management purpose for WSNs. The greatest part of the existing solutions focuses mainly on the optimisation of the key number, rekeying frequency and process or the encryption system of the distributed keys. Unfortunately, these systems are implemented as an additional and independent service, involving a considerable overhead. In this study, the authors propose µKMS (micro key management system) for WSNs. µKMS implements a dissimulation scheme, embedding the rekeying process messages on the unexploited coding space of the exchanged ZigBee packets. They have developed simulations, where the obtained results show the relevance of µKMS in terms of communication overhead, storage overhead, and energy consumption.


    1. 1)
      • 1. Fahmy, H.-M.-A.: ‘Wireless sensor networks: concepts, applications, experimentation and analysis’ (Springer, Book, Signals and Communication Technology, New York City, USA, 2016).
    2. 2)
      • 2. Kamila, N.-K.: ‘Handbook of research on wireless sensor network trends, technologies, and applications’ (IGI-Global, Book, Hershey, Pennsylvania, USA, 2016), DOI: 10.4018/978-1-5225-0501-3.
    3. 3)
      • 3. Challal, Y., Ouadjaout, A., Lasla, N., et al: ‘Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks’, J. Netw. Comput. Appl., 2011, 34, pp. 13801397.
    4. 4)
      • 4. Simplicio, M-A., Barreto, P-S-L-M., Margi, C-B., et al: ‘A survey on key management mechanisms for distributed wireless sensor networks’, Comput. Netw., 2010, 54, (15), pp. 25912612.
    5. 5)
      • 5. Nisha, D.M.: ‘Storage as a parameter for classifying dynamic key management schemes proposed for WSNs’. Proc. of the IEEE Int. Conf. Computational Techniques in Information and Communication Technologies (ICCTICT), India, 2016, pp. 5156.
    6. 6)
      • 6. He, X., Niedermeier, M., de-Meer, H.: ‘Dynamic key management in wireless sensor networks: a survey’, J. Netw. Comput. Appl., 2013, 36, (2), pp. 611622.
    7. 7)
      • 7. Ruj, S., Nayak, A., Stojmenovic, I.: ‘Pairwise and triple key distribution in wireless sensor networks with applications’, IEEE Trans. Comput., 2013, 62, (11), pp. 22242237.
    8. 8)
      • 8. Zhang, W., Shen, Y., Lee, S.: ‘A cluster-based group key management scheme for wireless sensor networks’. Proc. 12th Asia-Pacific Web Conf., 2010.
    9. 9)
      • 9. Shamir, A.: ‘How to share a secret’, ACM Commun., 1979, 22, pp. 612613.
    10. 10)
      • 10. Chan, H., Perrig, A., Song, D.: ‘Random key pre-distribution schemes for sensor networks’. Proc. 2003 IEEE Symp. Security and Privacy, 2003, pp. 197213.
    11. 11)
      • 11. Seo, S.-H., Won, J., Sultana, S., et al: ‘Effective key management in dynamic wireless sensor networks’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (2), pp. 371383.
    12. 12)
      • 12. Suganthi, N., Vembu, S.: ‘Energy efficient key management scheme for wireless sensor networks’, Int. J. Comput. Commun. Control, 2014, 9, (1), pp. 7178.
    13. 13)
      • 13. Du, D., Xiong, H., Wang, H.: ‘An efficient key management scheme for wireless sensor networks’, Int. J. Distrib. Sensor Netw., 2012, 8, (1), pp. 114.
    14. 14)
      • 14. IEEE: ‘IEEE standard 802.15.4: wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks’. Low-Rate Wireless Personal Area Networks (LR-WPANs), 2006, Available at URL:
    15. 15)
      • 15. ZigBee Alliance: ‘Standards: ZigBee specification’. ZigBee Standards Organization, Document ID 053474r20, 2012, Available at URL:
    16. 16)
      • 16. Pietro, R-D., Guarino, S., Verde, N-V., et al: ‘Security in wireless ad-hoc networks: a survey’, Comput. Commun., 2014, 51, pp. 120.
    17. 17)
      • 17. Cho, H.-H., Chen, C.-H., Shih, T.-K., et al: ‘Survey on underwater delay/disruption tolerant wireless sensor network routing’, IET Wirel. Sensor Syst., 2014, 4, (3), pp. 112121.
    18. 18)
      • 18. Jokhio, S.-H., Jokhio, I.-A., Kemp, A.-H.: ‘Node capture attack detection and defense in wireless sensor networks’, IET Wirel. Sensor Syst., 2012, 2, (3), pp. 161169.
    19. 19)
      • 19. Burrows, M., Abadi, M., Needham, R.: ‘A logic of authentication’, ACM Trans. Comput. Syst., 1990, 8, (1), pp. 1836.
    20. 20)
      • 20. Heizelman, W., Chandrakasan, A., Balakrishnan, H.: ‘Energy-efficient communication protocol for wireless sensor networks’. Proc. of the Hawaii Int. Conf. Systems, 2000.
    21. 21)
      • 21. Certicom Corporation: ‘SEC 1: elliptic curve cryptography’. Standards for Efficient Cryptography, 2000.
    22. 22)
      • 22. Meulenaer, G., Gosset, F., Standaert, F.-X., et al: ‘The energy cost of communication and cryptography in wireless sensor networks’. Proc. of the IEEE Int. Conf. Wireless and Mobile Computing, Networking and Communication, 2004, pp. 580585.

Related content

This is a required field
Please enter a valid email address