Document Type : Research Article


1 Department of Computer Engineering, University of Guilan, Rasht, Iran Department of Information Technology, Ports and Maritime Organization, Tehran, Iran

2 Department of Computer Engineering, University of Guilan, Rasht, Iran


Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol between sensor nodes to achieve maximum security with minimum cost. The main motivation of this paper is to apply the position of the sensor nodes as part of their identity for key management in heterogeneous sensor networks. In the proposed scheme, the position of sensor nodes is considered as a part of their identity and it is used for authentication and dedicating key to all network links. Comparing the proposed technique with other schemes shows that it has a higher level of scalability, security, and reliability with less memory complexity.


[1] Javier Lopez, Jianying Zhou, "Wireless sensor network security", IOS Press, Amsterdam, 2008.
[2] Ian F Akyildiz, Weilian Su, Yogesh Sankarasub-ramaniam, Erdal Cayirci, "Wireless sensor networks: a survey", Published by Elsevier Science B.V., Computer Networks, Vol.38, pp. 393422, 2002.
[3] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, "Wireless sensor network survey", Computer Networks, Vol.52, issue 12, pages: 22922330, 2008.
[4] Yuan Xue,"Key Management Schemes for Distributed Sensor Networks", PhD thesis, The University of Western Ontario, London, 2008.
[5] Laurent Eschenauer, Virgil D. Gligor, "A key-management scheme for distributed sensor networks", In proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, New York, 2002.
[6] Dahai Du, Huagang Xiong, Hailiang Wang, "An Efficient Key Management Scheme for Wireless Sensor Networks", International Journal of Distributed Sensor Networks, Vol.2012, Article ID 406254, pages: 1-14, 2012.
[7] Firdous Kausar, Sajid Hussain, Laurence T. Yang, Ashraf Masood, "Scalable and efficient key management for heterogeneous sensor networks", The Journal of Supercomputing, Vol.45, pages: 44-65, 2008.
[8] Saber Banihashemian, Abbas Ghaemi Bafghi, "A new key management scheme in heterogeneous wireless sensor networks", ICACT'10 Proceedings of the 12th international conference on Advanced communication technology Pages 141-146, Gangwon-Do, South Korea, February 07 - 10, 2010.
[9] Sarmad Ullah Khan, Claudio Pastrone, Luciano Lavagno, Maurizio A. Spirito, "An Energy and Memory-Efficient Key Management Scheme for Mobile Heterogeneous Sensor Networks", In Proceedings of 6th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1-8, Timisoara, 2011.
[10] Mehdi Ramezan Alagheband, Mohammadreza Aref, "A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks", In proceedings of Communications and Multimedia Security Lecture Notes in Computer Science, Vol.7025, pages: 18 31, Ghent, 2011.
[11] Jen-Yan Huang, I-En Liao, Hao-Wen Tang, "A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks", EURASIP Journal on Wireless Communications and Networking, Vol. 2011, Article ID 296704, pages: 1-10, 2011.
[12] Boushra Maala, Yacine Challal, Abdelmadjid Bouabdallah, "HERO: hierarchical key management protocol for heterogeneous wireless sensor networks", in IFIP International Federation for Information Processing, Vol. 264, pages: 125136, Boston, 2008.
[13] Xiaojiang Du, Mohsen Guizani, Yang Xiao, Hsiao-Hwa Chen, "A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks", IEEE Transaction on Wireless Communications 8(3), Pages: 1223 - 1229, 2009.
[14] Chunguang Ma, Zhiguo Shang, Huiqiang Wang, Guining Geng, "An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks", Mobile Ad-Hoc and Sensor Networks, LNCS 4864, pp. 854865, Springer-Verlag Berlin Heidelberg , 2007.
[15] Biming Tian, Song Han, Tharam S. Dillon, "A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain", Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 2009.
[16] Nishanth Chandran, Vipul Goyal, Ryan Moriarty and Rafail Ostrovsky, Position Based Cryptography", In Proceedings of 29th Annual International Cryptology Conference (Crypto 2009), Vol.5677, pages: 391-407, Santa Barbara, 2009.
[17] Giovanni Di Crescenzo, Richard Lipton, Shabsi Walfish, "Perfectly secure password protocols in the bounded retrieval model", In Proceedings of Third Theory of Cryptography Conference, Vol. 3876, pages: 225-244, 2006.
[18] Jeremy Ribeiro, Le Phuc Thinh, Jedrzej Kaniewski, Jonas Helsen, Stephanie Wehner, "Device-independence for two-party cryptography and position verification", arXiv:1606.08750, 2016.
[19] Piotr Bilskia, Wiesaw Winieckia, "Analysis of the position-based quantum cryptography usage in the distributed measurement system", Measurement 46, pages: 43534361, 2013.
[20] JunWei Zhang, JianFeng Ma, Cjao Yang, Li Yang, "Universally composable secure positioning in the bounded retrieval model", Science China Information Sciences, Vol. 58, Issue 11, pages: 115, November 2015.
[21] Yingpei Zeng, Jiannong Cao, Jue Hong, Shigeng Zhang, Li Xie, "Secure localization and location verification in wireless sensor networks: a survey", The Journal of Supercomputing, Vol. 64, Issue 3, pages: 685701, June 2013.
[22] Taha Yasin Rezapour, Meer Soheil Aboalghasemi, Reza Ebrahimi Atani, "Secure Positioning for Shipping Containers in Ports and Terminals Using WSN", 11th International ISC Conference on Information Security and Cryptology (ISCISC14), Univesity of Tehran, Pages: 10 14, 2014.
[23] Mei-jiao Duan, Jing Xu, "An efficient location- based compromise-tolerant key management scheme for sensor networks", Information Processing Letters, Volume 111, Issue 11, Pages: 503- 507, 15 May 2011.
[24] Amir Hassani Karbasi, Reza Ebrahimi Atani, "Projective plane-based key pre-distribution by key copying and exchanging based on connected dominating set in distributed wireless sensor networks", International Journal of Information and Communication Technology, Vol. 9, Issue 4, Pages: 438-462, 2016.
[25] Taha Yasin Rezapour, Meer Soheil Abolghasemi, Reza Ebrahimi Atani, "A position-based key management scheme for heterogeneous sensor networks", 10th International ISC Conference on Information Security and Cryptology (ISCISC13), Pages: 1-6, 2013.
[26] Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks", IEEE Journal on Selected Areas in Communications, Vol. 24 (2), Pages: 247260, 2006.