Abstract
Wireless sensor networks (WSNs) can be used in a wide range of environments. Due to the inherent characteristics of wireless communications, WSNs are more vulnerable to be attacked than conventional networks. Authentication and data confidentiality are critical in these settings. It is necessary to design a useful key management scheme for WSNs. In this paper, we propose a novel key management scheme called MAKM (modular arithmetic based key management). The proposed MAKM scheme is based on the congruence property of modular arithmetic. Each member sensor node only needs to store a key seed. This key seed is used to compute a unique shared key with its cluster head and a group key shared with other nodes in the same cluster. Thus, MAKM minimizes the key storage space. Furthermore, sensor nodes in the network can update their key seeds very quickly. Performance evaluation and simulation results show that the proposed MAKM scheme outperforms other key-pool-based schemes in key storage space and resilience against nodes capture. MAKM scheme can also reduce time delay and energy consumption of key establishment in large-scale WSNs.
1. Introduction
Wireless sensor networks (WSNs) consist of a large number of tiny, cheap, computational, and energy-constrained sensor nodes. They have gained numerous applications such as monitoring, target tracking, and military fields for data gathering and processing. Sensor nodes are randomly deployed in special areas to collect information. Since the data packets are transmitted over the air, it is not difficult for the adversaries to steal information by eavesdropping. To guarantee the confidentiality of information transmitted between sensor nodes, the messages should be encrypted before being transmitted. It is a great challenge to implement encryption algorithms in wireless sensor networks because of the constrained resource. Furthermore, malicious nodes may impersonate to be legitimate nodes and communicate with other valid nodes. This may subvert the whole networks. Therefore, a lightweight and efficient key management scheme should be used to solve all these problems mentioned above.
Recently, many approaches have been proposed to solve these problems. These solutions can be mainly classified into two categories: static and dynamic key management schemes. In static key management schemes, all keys are predistributed in sensor nodes. Each node chooses a set of keys from a key pool. In the bootstrapping phase, each node finds shared keys with its neighbors. If they cannot find a common key, they will set up a shared key with the help of one or more intermediate nodes. This can be found in [1– 8]. These schemes are based on the probabilistic key predistribution that guarantees a high probability of sharing keys between nodes. On the other hand, in dynamic key management schemes, some keys or key seeds are predistributed in sensor nodes. The session keys are established on demand. In most cases, there are some nodes acting as group heads or gateways to establish session keys for two nodes. These intermediate nodes are usually more powerful than other member nodes in terms of energy supply, transmission range, data processing capability, storage capacity, and tamper resistance. This can be found in [9– 12].
The proposed schemes are mainly based on two types of network structure. One is the peer-to-peer (P2P) network. All nodes in the network have the same capability [1– 3, 7– 9, 11, 12]. The other is a hierarchical structure [4– 6, 10, 13], in which some nodes are more powerful in computational capability and have larger storage capacity than common nodes. We mainly discuss a heterogeneous wireless sensor network in this paper. There are two different kinds of sensor nodes in the discussed network. The more powerful nodes act as cluster heads. The discussed WSN can be used in a wide range of applications such as military fields, aircrafts health monitor, and medical care. It can be used to collect useful and secret data. For example, sensor nodes can be deployed to monitor the status of all end systems in an aircraft. A cluster of nodes can monitor an end system.
We can find that many key-pool based schemes take much storage space. For example, in E-G scheme [1], we assume that a key ring has 100 keys and a key length is 16 Bytes (128 bits). Thus, a sensor node needs 1.6 KB to store its keys. However, a typical sensor node has only 4 KB of RAM [12]. On the other hand, dynamic key management schemes such as [11, 12] cost too much energy. Thus, it is necessary to design a key management scheme to balance the tradeoff between key storage space and energy consumption. In this paper, we present a novel solution of key management problem in WSNs. The proposed key management scheme is based on the congruence property of modular arithmetic. Each member node has a unique integer as its key seed, which can be used to calculate a shared key with the cluster head and a group key shared with all other member nodes in the same cluster. The shared group key can be used for broadcast encryption. This is especially efficient when a new node joins the network because the cluster head only needs to broadcast a key update message to finish updating the group key and its shared keys with each member node in its cluster. Other session keys are established on demand. Since each node only needs to store a single key seed, our scheme minimizes the key storage space. What is more, we add a mutual authentication during the key establishment phase, and the identity of each node is verified in our solution.
The remainder of this paper is organized as follows. Section 2 gives an introduction of pertinent related work. Section 3 details our novel key management scheme. The detailed analysis of performance evaluation is given in Section 4. Section 5 presents the simulation results. We compare our proposed scheme with other schemes by using NS-2. Finally, we draw the conclusions of this paper in Section 6.
2. Related Work
Eschenauer and Gligor [1] propose a key management scheme based on probabilistic key sharing among the nodes of random graph. Key distribution consists of three phases: key predistribution, shared-key discovery, and path key establishment. In key predistribution phase, each node randomly selects k keys from a key pool. In the shared-key discovery phase, each sensor node discovers the shared keys with its neighbors within its transmission range. If two nodes have no shared keys, they will establish a shared key via two or more links in path key establishment phase. In this scheme, once a node is compromised, the key ring will be revoked. What is more, these keys should also be removed from other node key rings. This will decrease the link connectivity of the network, and the affected nodes need to reconfigure their links.
Chan et al. [2] propose three mechanisms for sensor networks. In [2], Chan et al. propose a q-composite random key predistribution scheme. Any two nodes want to establish a pairwise key only when they have
Liu and Ning [3] introduce two pairwise key predistribution schemes: a random subset assignment scheme and a grid-based key predistribution scheme. In the random subset assignment scheme, a server generates a set of bivariate t-degree polynomials. A unique ID is assigned to each polynomial. Each node has a subset of these polynomials. Any two nodes that have polynomial shares on the same bivariate polynomial can set up a shared pairwise key directly. Otherwise, they will use path key establishment method to set up a pairwise key. A source node sends a request to its intermediate nodes to establish a pairwise key with the destination node. The intermediate nodes forward this request until a node finds a path to the destination node. In the grid-based key predistribution scheme, the server assigns each node an ID
In [4], Du et al. give an asymmetric predistribution (AP) key management scheme. We call this scheme AP for short. There are two types of nodes in AP: H-sensors and L-sensors. H-sensor nodes are much more powerful than L-sensor nodes. H-sensor nodes act as the cluster heads. AP consists of three phases: key predistribution phase, shared-key discovery phase, and H-sensor-based pairwise key setup phase. In key predistribution phase, each H-sensor is assigned with a special key
In [5], Lu et al. divide sensor nodes into I classes. The higher the class a node belongs to, the more powerful it is. So the Class I node is the most powerful node. The authors adopt two key distribution schemes. One is based on a key pool, and the other is based on a polynomial pool. In this scheme, a Class 1 node (C1) can communicate with several Class 2 (C2) nodes securely, as a C1 node and its neighboring C2 nodes share at least one key. This increases the key connectivity, reliability, and resilience of the network.
Yu and Guan propose a key management scheme by using deployment knowledge in [6]. The authors mainly discuss pairwise keys through one-hop links. The target field consists of many hexagon grids. Each grid is a group with the same number of sensor nodes. These groups are classified into two categories: some groups are the basic groups, others are normal groups. Each group has a public matrix G and a unique secret matrix A. Each basic group is assigned with a different matrix B. After this, each group is assigned with the matrices that have been assigned to its neighbor basic groups. After all groups have their B matrices assigned, each node selects one column from matrix G, one row from matrix A, and some rows from B matrices. The neighboring nodes can establish their pairwise keys by the rows and columns selected from the matrices. However, if two nodes cannot find a matched index, they will no longer be able to communicate with each other. This scheme increases the connectivity and strengthens the resilience against nodes capture.
Liu et al. [7] propose an asymmetric key predistribution scheme (AKPS). AKPS uses a trusted authority (TA) to distribute secret keys to each user and public keying material to keying material servers (KMSs). With the help of KMSs, two sensor nodes can establish a session key to encrypt messages. AKPS has an advantage over other schemes in that the compromise of KMSs does not disclose any information of the users' secret keys and the session keys.
Nguyen et al. propose a key management scheme considering the signal range in [8]. Each node is assigned with a subset of keys from the key pool by a key setup server. Two nodes in each other's transmission range will be assigned with a subset of common keys. This scheme also includes shared-key discovery and path key establishment phases. By using the location information of sensor nodes, it improves the connectivity and achieves better resilience than other schemes. However, this scheme depends too much on the deployment knowledge.
Zhu et al. [9] propose a localized encryption and authentication protocol (LEAP). Each node has four types of keys—an individual key shared with the base station, a pairwise key shared with another node, a cluster key shared with its neighboring nodes, and a group key shared with all the nodes in the network. The individual key
The SHELL key management scheme is proposed by Younis et al. in [10]. SHELL means scalable, hierarchical, efficient, location-aware, and light-weight. SHELL is based on EBS (exclusion basis system). Each node selects k keys from a key pool of size
In [11], Jing et al. propose an identity-based public key management scheme—C4 W. C4 W is based on the elliptic curve cryptography (ECC) and combined public key [14] system. Each node can compute other node public keys from their identities. If two nodes A and B want to establish a pairwise key, the key agreement steps are as follows: (1) A and B compute each other's public key,
Szczechowiak and Collier [12] propose a key agreement scheme based on identity-based cryptograph (IBC) for wireless sensor networks. We call this scheme IBC-KM for short. A trust authority is used to predistribute a secret key, a unique identity
Traynor et al. propose a suit of key management protocols known as LIGER in [13]. LIGER is an integration of LION and TIGER. In LION, there is no KDC in the network. Two L1 nodes establish a session key with the help of an L2 node. While in TIGER, the authentication and key establishment are achieved with the help of the KDC. There are two cases of authentication and key establishment in TIGER, one is for two L2 nodes, and the other is for an L1 node and an L2 node. Both of them use the KDC to generate a session key, and the session key is encrypted for both nodes.
Du et al. [15] propose a key management scheme using deployment knowledge. The proposed scheme is based on Eschenauer and Gligor's scheme. They divide the key pool S into
3. The Proposed Scheme: MAKM
From the above introduction, we can find that the following problems are not well considered in the aforementioned solutions.
Authentication. Many proposed schemes have no authentication mechanism to verify the identity of other nodes in the network. In other schemes, the authentication is based on the common keys between two nodes. However, these schemes are based on the probabilistic key management mechanism. If two nodes have no shared keys, they could not verify each other's identity directly. Malicious nodes may pretend to be legitimate nodes and subvert the network. Using Deployment Knowledge. In [3, 6, 8, 10, 15], authors use the location information of sensor nodes. The target fields are divided into many equal units with the same size. These schemes achieve higher connectivity and reduce storage space with the help of deployment knowledge. However, it is hard to deploy each sensor node to a predetermined location in actual environments, especially when the sensor nodes should be deployed in military fields or dropped from a helicopter.
In order to solve the problems mentioned above, we propose a modular arithmetic-based key management scheme—MAKM. There is an offline base station which is used to preload keys for each sensor node in the network. The whole network consists of many clusters. In each cluster, there is a cluster head (CH) which is used to distribute key seeds to its member sensor nodes. A cluster head has a more powerful processing capability and is more resistant to attacks than other normal member sensor nodes. Cluster heads can communicate with their neighboring cluster heads directly. The notations used in this paper are listed in Table 1. Figure 1 depicts the network structure.
List of used notations.

The structure of a heterogeneous wireless sensor network.
3.1. Elliptic Curve Cryptography
Public key cryptography algorithms are widely used in networks. RSA and ECC [16] are the most well-known algorithms. Compared with RSA, ECC achieves the same security with smaller key sizes, lower memory usage, computational cost and energy consumption. ECC with 160-bit keys can provide comparable security to RSA with 1024-bit keys [16]. Thus, ECC is more suited for WSNs. In our proposed scheme, we use elliptic curve digital signature algorithm (ECDSA) [16] to verify the identity of cluster heads. ECDSA takes about 10 KB of ROM and 152 Bytes of RAM on MICAz platform, and 8 KB of ROM and 160 Bytes of RAM on TelosB platform [17], which is viable for a 128 KB ROM and 4 KB RAM sensor node [12].
3.2. Key Predistribution Phase
In this subsection, we present the key predistribution for each sensor node. In our scheme, an authentication key
3.3. Bootstrapping Phase
During the bootstrapping phase, the cluster heads and member sensor nodes carry out a mutual authentication in order to protect them from man-in-the-middle attack. After all sensor nodes are deployed to the target field, the cluster heads begin to broadcast HELLO messages. The HELLO message contains the identity and the certificate of the cluster head. Each member sensor node will receive at least one message from its neighboring cluster heads. Some sensor nodes may receive several messages. In this case, they will choose the cluster heads according to the signal strength. Once a sensor node has chosen a cluster head, it verifies the certificate of the cluster head by the public key of the base station. If the cluster head is valid, the sensor node sends a JoinReq message to its cluster head
Key seed table in the cluster head.
3.4. Key Generation
Two integers a and b are congruent if they give the same remainder when divided by a positive integer p. This is written as follows:
In our MAKM scheme, each sensor node in the network has a large integer as its key seed. According to (4) and (5), each sensor node in the same cluster can get the same remainder
The key
Thus, these two nodes can get the same group key with different key seeds.
3.5. Addition of a New Node
In wireless sensor networks, some sensor nodes may run out of power supply over time because of the inherent energy constraint characteristic of wireless sensor nodes. This may significantly degrade the performance of the whole network. Some new sensor nodes need to be added to the network to mitigate this problem. In order to support the inclusion of the new sensor node, the key seeds of the existing nodes need to be updated to keep the backward secrecy. We assume that the new node will be deployed in cluster t. The cluster head
In addition, the key seed table in the cluster head should be refreshed by the following equation:
When a member sensor node in this cluster receives the update message, it decrypts the cipher text and gets the increment
After refreshing the key seeds for all sensor nodes, the cluster head verifies the identity of the new node. If the new node is a legitimate node, it will be given a key seed by the cluster head. This procedure is identical to the bootstrapping phase as described in Subsection 3.3.
3.6. Nodes Compromise
We assume that the cluster head can detect the compromise of a sensor node in its cluster. When a sensor node (Node k) is compromised, the shared key seeds in this cluster should be updated in order to keep forward secrecy. The cluster head

Key update message format.
Each node in the cluster can use its shared key with the cluster head to decrypt the key update message and get the increment
3.7. Key Establishment between Two Nodes
Sensor nodes are used to collect and process useful data. In most cases, this data is transmitted to the cluster head via multihops. So it only needs to be encrypted by the shared key between the sensor node and its cluster head. In our proposed scheme, each node has a unique key shared with its cluster head. However, in some cases, sensor nodes need to communicate with other nodes. For example, in an aircraft, sensor nodes need to send messages to other nodes about the status of the end systems they monitor. It is necessary to set up the session key for these two nodes. They may belong to a same cluster, or two different clusters. For this purpose, we classify the key establishment between two nodes into two types, intracluster and intercluster key establishment. We will discuss how to establish a session key between two nodes in the following paragraphs.
3.7.1. Intracluster Key Establishment
If two sensor nodes are in the same cluster, we call this procedure intracluster key establishment. They establish a session key with the help of their cluster head, which is shown in Figure 3. The key establishment message flow for Figure 3 is as follows:

Intracluster key establishment.
To establish a session key between these two nodes, the sensor node
3.7.2. Intercluster Key Establishment
On the other hand, if these two nodes belong to different clusters, we call this procedure intercluster key establishment, which is much more complex than intracluster key establishment. Figure 4 depicts this key establishment procedure. In our proposed scheme, sensor nodes are more likely to choose cluster heads to relay messages because they have a larger transmission range. For example, in Figure 4,

Intercluster key establishment.
At first,
4. Performance Evaluation
In this section, we will discuss our proposed scheme in detail. For analysis, we compare our scheme with E-G [1], C4 W [11], and IBC-KM [12]. We focus on the evaluation of the following criteria.
(1) Key Storage Space
Key storage space is the total memory usage of keys (or key seeds) stored in the network.
(2) Resilience against Sensor Node Capture
We assume that an adversary can attack a sensor node after the network is deployed. Once a sensor node is captured, the adversary can read all secret information in it. We evaluate the resilience of the network by estimating the probability of a secure link being compromised when there are some sensor nodes captured in the network.
(3) Time Consumption of Key Establishment
In this paper, time consumption of key establishment is the time for sensor nodes to establish shared keys during the network initialization.
4.1. Key Storage Space
Key storage space measures the total memory usage of keys (or key seeds) distributed in the network. In the proposed MAKM scheme, each member node only needs to store a key seed. A cluster head has an authentication key (16 bytes), a pair of public/private key (40/20 bytes) [16], a certificate (86 bytes) [19], an increment (4 bytes), and a key seed table. Other shared session keys are established on demand. Assume there are N nodes and H clusters in our test scene. The total key storage space is
In E-G scheme [1], each node picks m keys from the key pool. Thus, the total number of keys in the network is mN. In C4 W [11], each node is predistributed with a secret key (20 bytes), an l-bit length mask array
In Figure 5, we plot the total storage space requirements of these four schemes. From this figure we can get that IBC-KM needs the least key storage space because it only stores a single secret key in its cache. C4 W needs to store a forty-point array, which consumes much storage space. However, the authors in [11] imply that this point array can be written into a sensor node ROM, which will not use the node RAM space. From Figure 5, we can obtain that C4 W needs only a little storage space without the consideration of point array stored in ROM. The storage space of E-G scheme varies according to the key ring size. E-G needs less space than C4 W, but it needs more space than IBC-KM and MAKM.

Key storage space versus the number of nodes in the network.
4.2. Resilience against Sensor Node Capture
Wireless sensor nodes are more likely to be captured than other wireless nodes due to the constraint capability of sensor nodes. Thus, the resilience of a wireless sensor network is very important. We will discuss the resilience of the proposed MAKM scheme in the following paragraphs.
When a sensor node is compromised, we assume that the adversary can get all materials of the node. In a key-pool-based key management scheme [1], the capture of a sensor node will disclose some keys of the network. Other sensor nodes that have a subset of keys shared with this node will be affected. When the keys stored in the captured node are revoked, it will decrease the connectivity of the network. In Eschenauer and Gligor's scheme, suppose the size of the key pool is P. Each node picks m keys from the key pool. The probability that any two nodes have exactly t keys in common is
In [2], Chan et al. gives the probability of compromising a secure link between two uncompromised nodes under Eschenauer and Gligor's scheme (E-G Scheme) as follows:
In our proposed MAKM scheme, the shared session keys are established on demand. Each pair of nodes shares a unique symmetric key, and this session key is blind to other member sensor nodes. Thus, the capture of member nodes has no impact on the secure links between other uncompromised nodes.
Figure 6 shows that the probability of compromised links between uncompromised nodes varies with the number of compromised nodes. The x-axis is the number of nodes captured by the attacker, while y-axis is the probability of a link between two uncompromised nodes being compromised. In our test, the key pool size P is 10000, the total number of captured nodes varies from 10 to 300, and the keys preloaded in each node varies from 15 to 55.

Probability of a communication link between two uncompromised nodes being compromised.
Figure 6 shows the relationship between the probability of a secure link being compromised and the number of captured nodes. From this figure, we obtain that an increase of the keys preloaded in a sensor node under E-G scheme would make a secure link more likely to be compromised. This is because a senor node will disclose more keys when it is captured. We can also find the more nodes being captured under E-G scheme, the more likely a link being compromised. However, in C4 W, IBC-KM, and our proposed MAKM schemes, each sensor node has a unique key shared with another node. The capture of a sensor node will not affect the secure links between other uncompromised nodes. From the above analysis, we can find that the proposed MAKM scheme is very resilient against node capture.
4.3. Time Consumption of Key Establishment
In the following part, we will discuss the time consumption of key establishment.
In E-G scheme, key establishment consists of two phases: the shared-key discovery phase and path key establishment phase. The shared-key discovery phase takes place after each node has finished finding shared keys with its neighbors. Each node broadcasts a list of identifiers of the keys on its key ring to all its neighbors. Two neighboring nodes will set up a secure link if they share at least one key. However, if two neighboring nodes have no keys in common, they will begin a path key establishment phase with the help of their neighbors. A path key establishment may span one or more hops. In [1], the authors point out that if a neighboring node cannot be reached via a shared key (i.e., one link or one hop), it will take at most two or three hops to contact it. We can find that the time consumption of key establishment under E-G scheme is affected by the following three factors: the number of a node neighbors
We assume that there are N sensor nodes uniformly distributed in an
Theorem 1.
The expected number of neighbors of a node in the network is
Proof.
Suppose node i (
Since
We can get that the expected number of a sensor node neighbors
From (16) and (20), we can obtain that a higher node density will increase the time consumption of key establishment. This is because each node needs more time to find shared keys with more neighbors. Further, the smaller m and larger P will also increase the time consumption of key establishment. The smaller m is and the larger P is, the higher the probability that two neighboring nodes have no common keys is, and, therefore, longer paths are needed to be found to establish a path key.
In C4 W and IBC-KM, each node finds its neighbors at first. Then, the sensor node computes its neighboring node public keys according to their identities. Finally, two arbitrary neighboring nodes can compute a unique shared key. The shared key is determined by one node private key and its neighbor public key. Each sensor node establishes a set of shared keys with its neighbors. We can find that both C4 W and IBC-KM are identical to E-G and the time consumption of key establishment is affected by the number of a sensor node neighbors.
In our proposed MAKM scheme, there is no need to find shared keys. As shown in the authentication and key seed distribution procedure, we can find that the time consumption of key establishment is the time for each node to finish authentication and get a key seed from its cluster head. Thus, we can get the time consumption of key establishment
From the above analysis, we can find that the time consumption of key establishment under E-G, C4 W, and IBC-KM schemes increases with the node density of the network. In E-G, the ratio of key pool size of the network to key ring size of each node will also affect the time consumption of key establishment, while in our proposed scheme, the time consumption of key establishment is only determined by the ratio of cluster heads to member nodes. The simulation results will be shown in Section 5.
5. Simulations Study
In this section, we use NS2 to simulate our proposed MAKM scheme. We compare our MAKM with E-G, C4 W, and IBC-KM in terms of time and energy consumption of key establishment. The operation system is Linux-CentOS 5. The computer configuration is listed as follows: CPU: CoreII 1.86 G; memory: 2 G; hard disc: 250 G. The simulation environment settings used in the experiments are shown in Table 3.
Simulation environment settings.
5.1. Time Consumption of Key Establishment
From Section 4.3, we obtain that the time consumption of key establishment is affected by the node density and the key ring size under E-G scheme. C4 W and IBC-KM are also affected by node density. Figure 7 shows the average number of neighbors of a node in the network, where N varies from 200 to 1000. We can calculate the average number of neighbors of a node by (20). We plot the analytical and simulation results in Figure 7. We can find that the analytical result is consistent with the simulation result.

Average number of neighbors of a node in the network.
Figures 8(a), 8(b), and 8(c) show the average number of hops to set up a path key between two nodes under E-G scheme. Figure 8(a) shows the ratio of two neighboring nodes that can find a shared key directly, where

Path length to set up a pathkey under E-G scheme. (a) The percentage of two neighboring nodes that can find a shared key directly, (b) the percentage of two neighboring nodes that set up a path key via two hops, and (c) the percentage of two neighboring nodes that set up a path key via more than two hops.
In our experiments, we choose AES [21] as the encryption algorithm. We determine the model of the sensor MICAz that we use to estimate and analyze the time consumption of key management protocols. The MICAz is based on the low-power 8-bit microcontroller ATmega128 L with a clock frequency of 7.37 MHz. Sensor nodes run TinyOS and embed an IEEE 802.15.4 compliant CC2420 transceiver with a claimed data rate of 250 kbps [19]. The transmission power is set to be 0.065 W, and the receive power is 0.072 W. Table 4 shows the time consumption of some algorithms [12, 22, 23]. Since E-G and MAKM need much less time than C4 W and IBC-KM, we draw it in Figure 9(a). The simulation results of time consumption of key establishment are shown in Figure 9.
Time consumption of operations on MICAz.

Time consumption of key establishment. (a) E-G and MAKM; (b) C4 W, IBC-KM and MAKM.
From Figure 9(a), we can find that if there are few nodes in the network, E-G scheme needs less time to set up shared keys than MAKM scheme. However, E-G scheme will need more time to finish key establishment as the number of sensor nodes in the network increases, while the time consumption of our proposed MAKM is nearly constant. This is because the time consumption of our scheme is only determined by the ratio of cluster heads to member nodes, and the ratio is a constant in the network. Meanwhile, all nodes can verify their cluster head certificates at the same time. However, both the node density and the key ring size will affect the time consumption of key establishment under E-G scheme. A small key ring means that more neighbors will need to set up shared keys via path key establishment phase, which will prolong the time of key establishment. Since the number of sensor nodes in a wireless sensor network is always very large in practice, our scheme can achieve better performance in time consumption of key establishment than E-G scheme in large-scale networks. Figure 9(b) shows the time consumption of key establishment of C4 W, IBC-KM, and the proposed MAKM. We can get that C4 W and IBC-KM cost much more time than MAKM. This is because pairing and point multiplication algorithms need much time in a sensor node, which is shown in Table 4. What is more, as the number of nodes in the network increases, a sensor node will need more time to establish shared keys with its neighbors.
5.2. Energy Consumption of Key Establishment
Although security is a critical issue in wireless sensor networks, it is also necessary to consider the energy consumption of sensor nodes because they are constraint in power supply. If some sensor nodes run out of energy, the performance of the whole network will be degraded. In our MAKM scheme, we have tried to provide an energy-efficient solution. We run simulations to compare the energy consumption of our MAKM key establishment scheme with E-G scheme. Table 5 shows the energy consumption of some algorithms on different sensor platforms [19, 24, 25]. Authors in [11, 12] used energy models of MICA2 and MICAz, so we choose different sensor models to compare their energy consumption of key establishment. The simulation results are shown in Figure 10.
Energy consumption of operations on different platforms.

Energy consumption of key establishment. (a) Comparison of E-G and MAKM on TelosB platform; (b) comparison of C4 W and MAKM on MICA2 platform; (c) comparison of IBC-KM and MAKM on MICAz platform.
The number of sensor nodes varies from 200 to 1000. Other parameters are listed in Table 3. The simulation results are shown in Figure 10. We can find that C4 W and IBC-KM cost much more energy than E-G and MAKM. This is due to the too much energy cost by point multiplication, pairing, and mapping algorithms. Each node needs to operate these algorithms many times, and the number of operation times is determined by the number of a sensor node neighbors. However, in MAKM, the certificate verification is operated by a member sensor node only once. Compared with E-G, MAKM costs more energy in small-scale networks. However, the energy consumption of E-G increases much more quickly than MAKM. Since more nodes are deployed into the network, more shared keys need to be established for one node. But in our proposed MAKM, the number of shared keys for a sensor node will not be affected by the density of the network. So MAKM can reduce energy consumption of key establishment in large-scale WSNs.
6. Conclusions
In this paper, we propose a key management scheme by using the congruence property of modular arithmetic for heterogeneous wireless sensor networks. In our scheme, each member node in the same cluster can use a key seed to compute its unique shared key with its cluster head and a group key shared with other nodes in the same cluster. Compared with E-G, MAKM reduces much storage space. Meanwhile, it has a better resilience against node capture. The analytical and simulation results show that in large-scale WSNs, MAKM can perform better in time consumption and energy consumption of key establishment than E-G. We also compare the proposed MAKM with two typical public-key-based key management schemes. Though MAKM needs a little more RAM space to store key seeds than C4 W and IBC-KM, it can save much time and energy consumption. Further, the proposed MAKM scheme is efficient in key seed update. In E-G, once a sensor node is compromised, it will revoke all keys in the node. However, many other nodes have set up secure links by using the same keys in the compromised node. Thus, the affected nodes need to find a shared secret key by shared key discovery, even path key establishment phase. In our MAKM, the cluster head can keep forward secrecy by broadcasting a key update message.
Though it seems that ECC-based scheme consumes more energy, luckily, most computation has been finished by the offline base station. Signatures and public keys are predistributed in sensor nodes. Sensor nodes only need to verify the signatures of their cluster heads. Thus, to implement MAKM in large-scale WSNs is a good choice. It can save much storage space and reduce energy consumption compared with other schemes.
Footnotes
Acknowledgment
This work was supported by the National Natural Science Foundation of China (Project no. NSFC60879024).
