Skip to main content
Have a personal or library account? Click to login
Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs Cover

Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs

By: Khushboo Jain  
Open Access
|Feb 2025

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
  2. Othman, M. F., & Shazali, K. (2012). Wireless sensor network applications: A study in the environment monitoring system. Procedia Engineering, 41, 1204–1210.
  3. Mohamed, N., Al-Jaroodi, J., Jawhar, I., Idries, A., & Mohammed, F. (2020). Unmanned aerial vehicles applications in future smart cities. Technological forecasting and social change, 153, 119293.
  4. Islam, K., Shen, W., & Wang, X. (2012). Wireless sensor network reliability and security in factory automation: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1243–1256.
  5. Jain, K., Kumar, A., & Singh, A. (2023). Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022. Transactions on Emerging Telecommunications Technologies, 34(1), e4674.
  6. Jain, K., & Kumar, A. (2021). A lightweight data transmission reduction method based on a dual prediction technique for sensor networks. Transactions on Emerging Telecommunications Technologies, 32(11), e4345.
  7. Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey. Ad Hoc Networks, 24, 264–287.
  8. He, Y., Zhou, Z., Pan, Y., Chong, F., Wu, B., Xiao, K., & Li, H. (2024). Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization. High-Confidence Computing, 100233.
  9. Singh, A., & Jain, K. (2022). An efficient secure key establishment method in cluster-based sensor network. Telecommunication Systems, 79(1), 3–16.
  10. Gautam, A. K., & Kumar, R. (2021). A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Applied Sciences, 3(1), 50.
  11. Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In Security and Privacy Issues in IoT Devices and Sensor Networks (pp. 153–185). Academic Press.
  12. Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2024). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 1–18.
  13. Khan, M. N., Rao, A., & Camtepe, S. (2020). Lightweight cryptographic protocols for IoT-constrained devices: A survey. IEEE Internet of Things Journal, 8(6), 4132–4156.
  14. Pandey, S., & Bhushan, B. (2024). Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks. Wireless Networks, 30(4), 2987–3026.
  15. Iqbal, S., & Sujatha, B. R. (2024). Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network. Wireless Networks, 1–21.
  16. Gopalakrishnan, K. (2020). Security vulnerabilities and issues of traditional wireless sensors networks in IoT. Principles of internet of things (IoT) ecosystem: Insight paradigm, 519–549.
  17. Oztoprak, A., Hassanpour, R., Ozkan, A., & Oztoprak, K. (2024). Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review. ACM Computing Surveys.
  18. Kampourakis, V., Gkioulos, V., & Katsikas, S. (2023). A systematic literature review on wireless security testbeds in the cyber-physical realm. Computers & Security, 103383.
  19. Saeed, M. M., Ali, E. S., & Saeed, R. A. (2023). Data-driven techniques and security issues in wireless networks. In Data-Driven Intelligence in Wireless Networks (pp. 107–154). CRC Press.
  20. Alghamdi, A., Al Shahrani, A. M., AlYami, S. S., Khan, I. R., Sri, P. A., Dutta, P., ... & Venkatareddy, P. (2024). Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network. Wireless Networks, 30(6), 5851–5866.
  21. Jain, K., & Kumar, A. (2020). Energy-efficient data-aggregation technique for correlated spatial and temporal data in cluster-based sensor networks. International Journal of Business Data Communications and Networking (IJBDCN), 16(2), 53–68.
  22. Agarwal, A., Dev, A., & Jain, K. (2020). Prolonging sensor network lifetime by using energy-efficient cluster-based scheduling. Int J Sci Technol Res, 9(4), 3410–3415.
  23. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, Proc. ACM Conf. Comput. Commun. Securit, pp. 41–47, 2002-Nov.
  24. Albrecht, M., Gentry, C., Halevi, S., & Katz, J. (2009, November). Attacking cryptographic schemes based on “perturbation polynomials”. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 1–10).
  25. Saha, R., Geetha, G., Kumar, G., & Kim, T. H. (2018). RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Security and Communication Networks, 2018(1), 9802475.
  26. Masaeli, N., Javadi, H. H. S., & Erfani, S. H. (2020). Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds. Journal of Information Security and Applications, 54, 102519.
  27. Kandi, M. A., Kouicem, D. E., Doudou, M., Lakhlef, H., Bouabdallah, A., & Challal, Y. (2022). A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Computer Communications, 191, 11–25.
  28. Verma, R. M., & Basile, B. E. (2013, June). Modeling and analysis of LEAP, a key management protocol for wireless sensor networks. In 2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN) (pp. 23–25). IEEE.
  29. Yu, X., Fang, J., & Zhang, Z. (2013). A Security Mechanism Based on Authenticated Diffie-Hellman for WSN. TELKOMNIKA Indonesian Journal of Electrical Engineering, 11(6), 3349–3354.
  30. Mehra, P. S., Doja, M. N., & Alam, B. (2019). Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. International Journal of Communication Systems, 32(3), e3879.
  31. Chen, C. M., Deng, X., Gan, W., Chen, J., & Islam, S. H. (2021). A secure blockchain-based group key agreement protocol for IoT. The Journal of Supercomputing, 77, 9046–9068.
  32. Singh, A., & Jain, K. (2022). An automated lightweight key establishment method for secure communication in WSN. Wireless Personal Communications, 124(4), 2831–2851.
  33. Msolli, A., Ajmi, N., Helali, A., Gassoumi, A., Maaref, H., & Mghaieth, R. (2023). New key management scheme based on pool-hash for WSN and IoT. Journal of Information Security and Applications, 73, 103415.
  34. Jain, K., & Singh, A. (2024). IHKM: an improved hierarchical key management scheme for wireless sensor network. Telecommunication Systems, 1–16.
  35. Di Pietro, R., Mancini, L. V., & Mei, A. (2010). Hierarchies of keys in secure multicast communications. Journal of Computer Security, 18(5), 839–860.
  36. Doraipandian, M., & Neelamegam, P. (2015). An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks. Int. J. Netw. Secur., 17(6), 651–660.
  37. Li, Z., Wang, H., & Fang, H. (2017). Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet of Things Journal, 4(6), 1955–1963.
  38. Amutha, J., Sharma, S., & Sharma, S. K. (2022). An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for Wireless Sensor Networks. Expert Systems with Applications, 203, 117334.
  39. Ruj, S., Nayak, A., & Stojmenovic, I. (2012). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.
  40. Baburaj, E. (2017). Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. Computers & Electrical Engineering, 59, 274–290.
  41. Das, A. K., Wazid, M., Yannam, A. R., Rodrigues, J. J., & Park, Y. (2019). Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access, 7, 55382–55397.
  42. Yu, B., & Li, H. (2019). Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things. International Journal of Distributed Sensor Networks, 15(9), 1550147719879379.
  43. Zhao, G., Yang, X., Zhou, B., & Wei, W. (2010, July). RSA-based digital image encryption algorithm in wireless sensor networks. In 2010 2nd International conference on signal processing systems (Vol. 2, pp. V2-640). IEEE.
  44. Chatterjee, S., & Das, A. K. (2015). An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks, 8(9), 1752–1771.
  45. Ali, I., Hassan, A., & Li, F. (2019). Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Vehicular Communications, 16, 45–61.
  46. Dhanda, S. S., Singh, B., & Jindal, P. (2020). Lightweight cryptography: a solution to secure IoT. Wireless Personal Communications, 112(3), 1947–1980.
  47. Twardokus, G., Bindel, N., Rahbari, H., & McCarthy, S. (2022). When cryptography needs a hand: Practical post-quantum authentication for V2V communications. Cryptology ePrint Archive.
  48. Ganeshan, A., Jayagopalan, S., Perumal, B., & Sarveshwaran, V. (2023). Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSN. Concurrency and Computation: Practice and Experience, 35(28), e7861.
  49. Almuseelem, W. (2023). Energy-efficient and security-aware task offloading for multi-tier edge-cloud computing systems. IEEE Access.
  50. Aydeger, A., Zeydan, E., Yadav, A. K., Hemachandra, K. T., & Liyanage, M. (2024, October). Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography. In 2024 15th International Conference on Network of the Future (NoF) (pp. 195–203). IEEE.
  51. Ahlawat, P., & Dave, M. (2018). A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security. International Journal of Communication Systems, 31(12), e3713.
  52. Dinker, A. G., & Sharma, V. (2019). Polynomial and matrix based key management security scheme in wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography, 22(8), 1563–1575.
  53. Roy, K. S., Deb, S., & Kalita, H. K. (2024). A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. Digital Communications and Networks, 10(4), 989–1000.
  54. Kumar, V., Malik, N., Dhiman, G., & Lohani, T. K. (2021). Scalable and storage efficient dynamic key management scheme for wireless sensor network. Wireless Communications and Mobile Computing, 2021(1), 5512879.
  55. Xu, C., & Liu, W. (2014). Key updating methods for combinatorial design based key management schemes. Journal of Sensors, 2014(1), 134357.
  56. Kumar, A., & Pais, A. R. (2019). A new combinatorial design based key pre-distribution scheme for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 10, 2401–2416.
  57. Solari Esfehani, N., & Haj Seyyed Javadi, H. (2021). A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network. Wireless Networks, 27(4), 3025–3052.
  58. Mahamat, M., Jaber, G., & Bouabdallah, A. (2023). Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges. Wireless Networks, 29(2), 787–808.
  59. Poornima, M. R., Vimala, H. S., & Shreyas, J. (2023). Holistic survey on energy aware routing techniques for IoT applications. Journal of Network and Computer Applications, 213, 103584.
  60. Jain, K., Agarwal, A., & Abraham, A. (2022). A combinational data prediction model for data transmission reduction in wireless sensor networks. IEEE Access, 10, 53468–53480.
  61. Rao, P. M., & Deebak, B. D. (2023). A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions. Ad Hoc Networks, 146, 103159.
  62. Sen, J. (2023). A survey of cryptography and key management schemes for wireless sensor networks. In Wireless Sensor Networks-Design, Applications and Challenges. IntechOpen.
  63. Gupta, M., & Jain, K. (2024). A Comprehensive Survey of Aerial Mesh Networks (AMN): Characteristics, Application, Open Issues, Challenges, and Research Directions. Wireless Personal Communications, 138(1), 333–368.
  64. Fathalla, E., & Azab, M. (2024). Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations. IEEE Access.
  65. Shim, K. A. (2021). A survey on post-quantum public-key signature schemes for secure vehicular communications. IEEE Transactions on Intelligent Transportation Systems, 23(9), 14025–14042.
  66. Surla, G., & Lakshmi, R. (2023). Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks. Optical and Quantum Electronics, 55(14), 1252.
  67. Al-Mekhlafi, Z. G., Al-Janabi, H. D. K., Khalil, A., Al-Shareeda, M. A., Mohammed, B. A., Alsadhan, A. A., ... & Almekhlafi, K. (2024). Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications. IEEE Access.
  68. Sharma, P., & BR, P. (2024). A lightweight group key management scheme with constant rekeying cost and public bulletin size. Information Security Journal: A Global Perspective, 33(2), 97–120.
  69. Logeshwaran, J., Shanmugasundaram, R. N., & Lloret, J. (2024). Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. Wireless Networks, 1–33.
  70. Sapra, V., Sapra, L., Bhardwaj, A., Almogren, A., Bharany, S., Ur Rehman, A., & Ouahada, K. (2024). Diabetic Retinopathy Detection Using Deep Learning with Optimized Feature Selection. Traitement du Signal, 41(2).
  71. Khashan, O. A., Khafajah, N. M., Alomoush, W., Alshinwan, M., & Alomari, E. (2024). Smart energy-efficient encryption for wireless multimedia sensor networks using deep learning. IEEE Open Journal of the Communications Society.
  72. Logeshwaran, J., Shanmugasundaram, R. N., & Lloret, J. (2024). Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN. Wireless Networks, 1–33.
DOI: https://doi.org/10.2478/ias-2025-0002 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 18 - 37
Published on: Feb 28, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2025 Khushboo Jain, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.