Skip to main content
Have a personal or library account? Click to login
Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs Cover

Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs

By: Khushboo Jain  
Open Access
|Feb 2025

Figures & Tables

Figure 1.

Categories of Key management schemes in WSNs.

Pre-distribution Key Management Schemes_

Scheme NameYearDescriptionAdvantagesDisadvantagesReferences
Eschenauer-Gligor Scheme2002Randomly pre-distribute keys to nodes from a key pool to establish common keys post-deployment.Simple, scalable for small networks.Vulnerable to node capture.[23]
Q-Composite Scheme2009Improves Eschenauer-Gligor by requiring multiple shared keys to establish communication.Higher resilience against node capture.Increased memory usage.[24]
Enhanced Random Key Distribution2018Adds redundancy and hashing to random pre-distribution for better resilience.Stronger security, low overhead.Increased computational costs.[25]
Multiple Key Pools2020Nodes are preloaded with keys from region-specific key pools to improve localization security.Reduces key exposure.Limited adaptability for mobility.[26]
Hybrid Key Pre-distribution2022Combines deterministic and random methods to ensure both security and scalability.Balances security and efficiency.Implementation complexity.[27]

Challenges in key management in WSNs_

ChallengeDescriptionReferences
Resource ConstraintsSNs have limited computational power, memory, and energy, making it challenging to implement complex cryptographic algorithms.[10,11]
ScalabilityLarge networks with thousands of SNs require scalability but key distribution and maintenance increase the complexity.[12,13]
Dynamic TopologySNs join or leave frequently due to mobility, failures, or environmental changes that require real-time key updates.[14,15]
Physical VulnerabilitySNs in hostile environments are prone to tampering and physical capture that can risk key exposure and network compromise.[16,17]
Adversarial ThreatsWSNs face eavesdropping, spoofing, and man-in-the-middle attacks which necessitate the need for robust key management protocols.[18,19]
Energy EfficiencyCryptographic operations consume significant energy, affecting the lifespan of battery-powered SNs.[20,21,22]

Public Key Cryptography (PKC) Approaches in WSN_

Scheme NameYearDescriptionAdvantagesDisadvantagesReferences
RSA-Based Encryption2010Uses large prime factorization for key generation in resource-constrained networks.High security; well-established protocol.High computational requirements.[43]
ECC-Based Key Management2015Utilizes elliptic curve cryptography for secure communication with smaller keys.High security with low resource usage.Computationally expensive for real-time updates.[44]
Hybrid PKC-Symmetric Schemes2019Combines PKC for initial key exchange with symmetric encryption for ongoing communication.Efficient after initial exchange; scalable.Vulnerable during the key negotiation phase.[45]
Lightweight ECC2020Optimizes ECC for WSNs by reducing algorithm complexity.Suitable for resource-limited nodes; strong encryption.Still more complex than symmetric methods.[46]
Quantum-Resilient PKC2022Adapts public key schemes to counter quantum computing attacks.Future-proof against quantum threats.Not yet standardized; higher energy consumption.[47]
Blockchain-Based Key Management2023Uses blockchain to manage and distribute public keys securely.Decentralized and tamper resistant.High storage and energy requirements.[48]
ECC with Energy-Aware Protocol2023Integrates ECC with energy-aware protocols to minimize power consumption.Balances security and energy usage.Limited testing in large networks.[49]
Post-Quantum ECC2024Enhances ECC with post-quantum algorithms to future-proof against advanced attacks.High security and forward compatibility.Computationally heavy for small nodes.[50]

Research Solutions and description to Key Management in WSN_

Research SolutionDescriptionReference
Hybrid Cryptographic SolutionsCombining lightweight cryptographic techniques with quantum-resistant algorithms for efficient security in WSNs.[66,67]
Adaptive Key ManagementDynamically adjusting key parameters based on factors like network conditions, traffic, and energy usage.[68,69]
Machine Learning for OptimizationUsing AI to optimize energy usage, predict threats, and adjust cryptographic techniques in WSNs.[70,71,72]

Matrix-based key management schemes in WSN_

Scheme NameYearDescriptionAdvantagesDisadvantagesReferences
Blom’s Scheme2012An asymmetric matrix-based scheme that generates unique pairwise keys using a shared secret matrix.High resilience to node capture.Memory and computation overhead increase with network size. Not scalable for large networks.[39]
Efficient for small to medium networks.
Triple Key Matrix Scheme2017Extends matrix-based schemes to provide triple key distribution for enhanced communication security.High resilience to single-node capture.Increased memory requirements.[40]
Supports multi-tier security.Computationally intensive for large networks.
Attack Matrix Scheme2018Uses dominance key sets in a cost-effective matrix design to secure communication.Cost-effective design.Limited applicability in highly dynamic networks.[52]
Resistant to various attacks.Requires careful dominance set design.
Suitable for clustered WSNs.
Polynomial and Matrix-Based Scheme2019Combines polynomial-based key pre-distribution with matrix design for enhanced security.Combines benefits of polynomial and matrix methods.Higher computational overhead due to polynomial calculations.[53]
Strong security against node capture.Complex setup for large networks.

Dynamic Key Management Schemes in WSNs_

Scheme NameYearDescriptionAdvantagesDisadvantagesReferences
LEAP (Localized Encryption and Authentication Protocol)2013Uses cluster heads for efficient key distribution in dynamic networks.Scalable and efficient.Cluster head compromise risk.[28]
Diffie-Hellman Protocol2013Dynamically establishes keys post-deployment through public-private key exchanges.No pre-shared keys are required.High computational overhead.[29]
Lightweight Key Update2019Reduces the cost of key updates in dynamic networks through periodic rekeying.Energy-efficient updates.Vulnerable to synchronization issues.[30]
Cluster Key Negotiation2021Dynamic key management within clusters for better adaptability in mobile WSNs.Better adaptability.Increased cluster head workload.[31]
An Efficient Secure Key Establishment Method in Cluster-Based WSNss2022Proposes lightweight key establishment using shared keys managed by cluster heads.Low energy consumption and high efficiency.Limited adaptability for heterogeneous networks.[32]
Adaptive Key Management2023Adjusts key update intervals based on network topology changes and threats.Dynamic and threat adaptive.Complexity in threat assessment.[33]
IHKM: An Improved Hierarchical Key Management Scheme2024An enhancement of hierarchical schemes, optimizing key distribution and security in cluster-based WSNs.Better scalability and resilience to attacks.Increased computational complexity.[34]

Research Directions, Proposed Solutions, and Optimisation Methods Related to Key Management in WSN_

Research DirectionProposed SolutionsOptimization Methods
Energy EfficiencyLightweight cryptographyEnergy-aware cryptographic protocols and duty-cycling techniques aim to reduce energy consumption while maintaining security levels.
Symmetric encryption replacementReplacing computationally expensive public-key cryptography with more energy-efficient symmetric algorithms.
Energy-efficient key distributionUse of localized or hierarchical key distribution techniques to reduce communication overhead.
Resilience to Node CaptureDynamic key revocationAdaptive protocols that revoke keys once a node is compromised, minimizing the impact on the overall network.
Distributed trust modelsEmploying decentralized approaches to ensure that compromised nodes do not breach the entire network’s security.
Physical-layer securityIncorporation of techniques such as secret sharing and random key pre-distribution to make key extraction harder.
ScalabilityCluster-based key managementUsing a cluster-head model to divide responsibilities, minimize communication overhead, and enhance scalability in large networks.
Hierarchical key managementMulti-tiered architecture that efficiently distributes keys among different levels of the network.
Hierarchical revocation strategiesImproving scalability by implementing efficient key revocation and update mechanisms that can scale with the network size.
Post-Quantum SecurityLattice-based cryptographyExploring quantum-resistant algorithms, such as lattice-based encryption, that can be applied in WSNs.
Hash-based signaturesUse of quantum-secure hash-based schemes for signing messages and managing key distributions.
Hybrid cryptosystemsDeveloping hybrid cryptographic schemes that combine classical and quantum-resistant algorithms for backward compatibility.

Pairwise Key Establishment in WSN_

Scheme NameYearDescriptionAdvantagesDisadvantagesReferences
Blom’s Scheme2012Uses a matrix-based approach for generating unique pairwise keys between nodes.High resilience to node capture.Computationally intensive.[39]
Polynomial-Based Scheme2017Employs polynomial functions for establishing secure pairwise keys among nodes.Efficient for small groups.Vulnerable to node tampering.[40]
ECC-Based Pairing2019Utilizes elliptic curve cryptography for pairwise key establishment in resource-constrained WSNs.Strong security.High computational overhead.[41]
ID-Based Key Agreement2019Leverages node identifiers for key establishment to reduce memory overhead.Efficient and memory-saving.Less flexible for dynamic networks.[42]

Combinatorial-based key management schemes in WSN_

Scheme NameYearDescriptionAdvantagesDisadvantagesReferences
Scalable and Storage-Efficient Dynamic Key Management2021Proposes a scalable key management scheme that optimizes storage efficiency while ensuring secure key distribution in WSNs.Reduces storage overhead, supports large-scale WSNs, and enhances security resilience.Requires additional computational resources for key updates.[54]
Key Updating for Combinatorial Design-Based Key Management2014Introduces efficient key update methods for combinatorial-based key management schemes to enhance security.Improves resilience against key compromise and reduces overhead for rekeying.May introduce synchronization delays in large networks.[55]
Combinatorial Design-Based Key Pre-Distribution2019Develops a key pre-distribution scheme using combinatorial designs to optimize key sharing and security.Enhances scalability, ensures deterministic key assignment, reduces storage requirements.Requires careful parameter selection to balance security and connectivity.[56]
Survey of Combinatorial Key Pre-Distribution in IoT2021Provides a comprehensive review of combinatorial design-based key management schemes for IoT and WSNs.Identifies strengths and weaknesses of various combinatorial approaches, highlights emerging trends.Some reviewed schemes may not be adaptable to dynamic network environments.[57]

Comparison of Key Pool and Key Size in Key Management Schemes in WSN_

CriteriaLarge Key PoolSmall Key PoolLong Key SizeShort Key Size
SecurityHigh (low key-sharing probability)Moderate (higher key-sharing probability)High (strong encryption)Low (vulnerable to brute force)
Storage NeedsHigh (requires more memory)Low (minimal memory requirements)High (large memory usage)Low (minimal memory usage)
Energy EfficiencyLow (more keys to process)High (fewer keys to process)Low (computationally intensive)High (less computational demand)
ScalabilitySuitable for large networksSuitable for small networksSuitable for critical applicationsSuitable for low-security setups

Comparative Analysis of Key Management Schemes in WSN

SchemeAdvantagesDisadvantagesIdeal Scenarios
Random Key Pre-distributionSimple to implementVulnerable to node captureSmall networks with low-security needs, where simplicity and cost-effectiveness are more important than high-security
Minimal computation requiredLimited security against node compromise
Dynamic Key ManagementFlexibleHigh computational overheadSuitable for dynamic networks where nodes frequently join or leave, such as mobile sensor networks or networks with changing topologies
Adaptable to changes in the networkRequires communication for key exchange
Cluster-based ManagementScalableVulnerability of cluster headLarge-scale networks or hierarchical setups, where SNs are grouped into clusters and a cluster head controls key management
Efficient key management due to centralized control by the cluster headSingle point of failure if the cluster head is compromised
Hierarchical ManagementEfficient distribution and revocation of keysRequires a central authorityMulti-tier networks, such as military surveillance or critical infrastructure, where different levels of security are required.
Easy to scale in large networksSingle point of failure at higher tiers
Pairwise Key EstablishmentHigh securityComplex setupHigh-security applications such as military and defense where confidentiality between specific node pairs is critical.
Resilient to node capture, as each pair has a unique keyScalability issues with large networks
Public Key Cryptography (PKC)Strong security with asymmetric encryptionHigh computational and memory overheadCritical infrastructure and applications requiring high security, such as IoT networks in healthcare and finance.
Can support digital signatures for authenticityNot ideal for resource-constrained devices
Matrix-Based Key ManagementHigh resilience to node captureComputationally intensive Scalability challenges for very large networksSmall to medium-sized networks requiring high security, such as industrial IoT, military networks, or healthcare sensor systems.
Enables secure pairwise communication
Scalable with small to medium networksHigher memory requirements for matrix storage
Combinatorial-Based Key ManagementHigh scalability, resilience to node captureComplex key distributionLarge-scale WSNs with high-security requirements and limited storage capacity
Efficient key discoveryThe trade-off between security and connectivity
Reduced memory overheadLimited adaptability

Hierarchical Key Management Schemes in WSNs_

Scheme NameYearDescriptionAdvantagesDisadvantagesReferences
Logical Key Hierarchy (LKH)2010Uses a tree structure where higher-level nodes manage key distribution to lower-level nodes.Efficient key revocation.Requires central authority.[35]
Multi-Tier Key Management2015Divides the network into multiple tiers with different keys for different levels.Scalable and secure.Management complexity.[36]
Role-Based Key Distribution2017Assigns keys based on node roles within the network (e.g., sensors, aggregators).Efficient and role aware.Static role assignment challenges.[37]
Hybrid Hierarchical Scheme2022Combines LKH with cluster-based management to optimize scalability and security.Balances hierarchy and efficiency.Increased resource usage.[38]
DOI: https://doi.org/10.2478/ias-2025-0002 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 18 - 37
Published on: Feb 28, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2025 Khushboo Jain, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.