Survey of Effective of Combinatorial Design Schemes in Wireless Sensor Networks Security

Document Type : Research Paper


1 Department of Computer Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran

2 Department of Mathematics and Computer Science, Shahed University, Tehran, Iran


Abstract- Wireless sensor networks (WSNs) are made up of thousands of small sensor nodes that are capable of detecting, calculating, and transferring data via networks. Although there are certain resource limits, wireless transmission is still an effective way to transport information. The secure transfer of data is critical in a WSN. Key management techniques have been established for the purposes of security. Key pre-distribution is one of the key management methods used to assign keys to the devices before deploying them in the wireless sensor networks. The challenges of these schemes include memory consumption due to limited device resources, scalability, connectivity, and resilience against node capture attacks. Combinatorial designs with neutrality characteristics, which are based on mathematical structure and impose low computational overhead and communication overhead, are used in key pre-distribution and information security of wireless sensor networks. In this paper, some key pre-distribution methods based on the combinatorial designs are reviewed. Finally, the comparison of performance parameters is illustrated in tables. Suggestions to improve future research are considered as well.


1- J. Zhang and V. Varadharajan, "Wireless sensor network key management survey and taxonomy," Journal of network and computer applications, vol. 33, no. 2, pp. 63-75, Mar. 2010.
2- C. Y. Chen and H. C. Chao, "A survey of key distribution in wireless sensor networks," Security and Communication Networks, vol. 7, no. 12, pp. 2495-2508, July 2014.
3- M. Anzani, H. H. S. Javadi, and A. Moeni, "A deterministic key predistribution method for wireless sensor networks based on hypercube multivariate scheme," Iranian Journal of Science and Technology, Transactions A: Science, vol. 42, no. 2, pp. 777-786, July 2018.
4- H. Haj Seyyed Javadi and M. Anzani, "Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design," Journal of Advances in Computer Engineering and Technology, vol. 1, no. 3, pp. 33-38, Apr. 2015.
5- K. Alhamazani et al., "An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art," Computing, vol. 97, no. 4, pp. 357-377, Apr. 2015.
6- M. Ali et al., "SeDaSC: Secure data sharing in clouds," IEEE Systems Journal, vol. 11, no. 2, pp. 395-404, June 2015.
7- B. Guan, J. Wu, Y. Wang, and S. U. Khan, "CIVSched: A communication-aware inter-VM scheduling technique for decreased network latency between co-located VMs," IEEE trans. cloud computing, vol. 2, no. 3, pp. 320-332, July 2014.
8- S. H. Erfani, H. H. Javadi, and A. M. Rahmani, "A dynamic key management scheme for dynamic wireless sensor networks," Security and Communication Networks, vol. 8, no. 6, pp. 1040-1049, Apr. 2015.
9- V. Modiri, H. H. S. Javadi, A. M. Rahmani, and M. Anzani, "Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks," Information Systems & Telecommunication, p. 53, Feb. 2020.
10- L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, Nov. 2002.
11- D. Stinson, Combinatorial designs: constructions and analysis. Springer Science & Business Media, 2007.
12- N. S. Esfehani and H. H. S. Javadi, "A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network," Wireless Networks, vol. 27, no. 4, pp. 3025-3052, May. 2021.
13- J. Dong, D. Pei, and X. Wang, "A key predistribution scheme based on 3-designs," in International Conference on Information Security and Cryptology, pp. 81-92: Springer, Sept. 2007.
14- H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in 2003 Symposium on Security and Privacy, IEEE, pp. 197-213, May. 2003.
15- P. Schaffer, K. Farkas, A. Horvath, T. Holczer, and L. Buttyan, "Secure and reliable clustering in wireless sensor networks: a critical survey," Computer Networks, vol. 56, no. 11, pp. 2726-2741, July 2012.
16- S. A. Camtepe and B. Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks," in European symposium on research in computer security, pp. 293-308: Springer, 2004.
17- C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Annual international cryptology conference, pp. 471-486: Springer, May. 1992.
18- R. Blom, "An optimal class of symmetric key generation systems," in Workshop on the Theory and Application of of Cryptographic Techniques, pp. 335-338: Springer, Dec. 1984.
19- D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 1, pp. 41-77, Feb. 2005.
20- I. Anderson, Combinatorial designs: construction methods. Ellis Horwood Chichester, 1990.
21- A. Pattanayak and B. Majhi, "Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited," IACR Cryptol. ePrint Arch., vol. 2009, pp. 131, 2009.
22- J. Lee and D. R. Stinson, "A combinatorial approach to key predistribution for distributed sensor networks," in IEEE Wireless Communications and Networking Conference, vol. 2, pp. 1200-1205, Oct. 2005.
23- P. N. Bahrami, H. H. Javadi, T. Dargahi, A. Dehghantanha, and K. K. R. Choo, "A hierarchical key pre-distribution scheme for fog networks," Concurrency and Computation: Practice and Experience, vol. 31, no. 22, pp. e4776, Aug. 2019.
24- W. Bechkit, Y. Challal, and A. Bouabdallah, "A new class of Hash-Chain based key pre-distribution schemes for WSN," Computer communications, vol. 36, no. 3, pp. 243-255, Feb. 2013.
25- M. Javanbakht, H. Erfani, H. H. S. Javadi, and P. Daneshjoo, "Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs," Security and Communication Networks, vol. 7, no. 11, pp. 2003-2014, Jan. 2014.
26- T. Dargahi, H. H. Javadi, and M. Hosseinzadeh, "Application specific hybrid symmetric design of key pre-distribution for wireless sensor networks," Security and Communication Networks, vol. 8, no. 8, pp. 1561-1574, Sept. 2015.
27- V. Modiri, H. H. S. Javadi, and M. Anzani, "A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design," Wireless Personal Communications, vol. 96, no. 2, pp. 2821-2841, June 2017.
28- M. Anzani, H. H. S. Javadi, and V. Modirir, "Key-management scheme for wireless sensor networks based on merging blocks of symmetric design," Wireless Networks, vol. 24, no. 8, pp. 2867-2879, Apr. 2018.
29- N. Masaeli, H. H. S. Javadi, and S. H. Erfani, "Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds," Journal of Information Security and Applications, vol. 54, pp. 102519, Oct. 2020.
30- W. Bechkit, Y. Challal, A. Bouabdallah, and V. Tarokh, "A highly scalable key pre-distribution scheme for wireless sensor networks," IEEE trans. wireless communications, vol. 12, no. 2, pp. 948-959, Feb. 2013.
31- J. Lee and D. R. Stinson, "On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs," ACM Transactions on Information and System Security (TISSEC), vol. 11, no. 2, pp. 1-35, May. 2008.