Abstract
Wireless sensor networks (WSNs) are subject to various attacks because of the vulnerable environment, limited recourse, and open communication channel. To protect WSNs, in this paper, we present a Secret sharing-based key management (SSKM). SSKM utilizes the advantages of hierarchical architecture and adopts two-level key management and authentication mechanism, which can efficiently protect the allover network communication security and survivability. Different from previous works, the SSKM distributes keys based on secret sharing mechanism by the clustered architecture, which not only localizes the key things but also keeps scalability. The SSKM provides various session keys, the network key for base station (BS) and cluster heads (CHs); the cluster key between the cluster head and member nodes. The SSKM dynamically generates different keys based on different polynomials from BS in different periods which can protect the network from the compromised nodes and reduce the high probability of the common keys. The security analysis shows that the SSKM can prevent several attacks effectively and reduce the energy consumption.
1. Introduction
Due to the development of internet of things (IoT) and cyber physical system (CPS), wireless sensors have been deployed in many applications, such as in smart grid, national security, intelligent transportation, forest detection, or chemical harmful gas monitoring [1]. However, wireless sensor networks (WSNs) usually consist of tiny sensors which have low computational capability, small storage, and limited energy; that is, the WSNs are often subject to a variety of attacks, such as eavesdropping attack and flood attack and so on. Once a sensor is compromised by adversaries, the information materials of the sensor become non secretive and intercepted by enemy, and the entire network is threatened [2].
Therefore, security mechanisms in WSN are required to provide data confidentiality, integrity, freshness, availability, and authentication [2]. Moreover, in view of the excellent performance of the clustering algorithm in WSN, the hierarchical architectures are often used in WSN applications [3]. Normally, cryptographic methods of securing a network are the key management strategy, and it has been intensively studied in the literature of WSNs [4–13]. Therefore, some literatures adopt hierarchical architecture to deploy key system on them to protect the communication in WSNs [4–10].
In [5, 6], the authors employed the secret sharing mechanism to distribute keys into nodes, which can effectively generate and assign keys. However, in these schemes, the network must exchange many messages to establish key system, which consumes lots of energy. In this paper, we present a novel secret sharing-based key management (SSKM).
In SSKM, considering that the energy efficiency is a dominant consideration problem of WSNs, we firstly employ the maximum energy cluster head (MECH) protocol to form cluster. Different from other hierarchical architectures, MECH protocol limits the size of cluster to generate uniform cluster. In each cluster, there is a sensor, called cluster head (CH), collecting information from other cluster member nodes and forwarding the processed information to the base station.
Therefore, to protect the communication channel from CH to BS, we present a network key. Firstly, the BS encrypts the network key with a secret, puts the secret as constant of the polynomial, and divides the secret into shares based on Lagrange interpolation formula. To reconstruct the polynomial of
Also, similar to network key, we design a cluster key to protect the communication between the cluster head and member nodes. Unlike the BS, CHs have no sufficient energy to broadcast messages. Thus, the BS deploys key material to sensors in advance, such as polynomials and revoked list. Then, the CH just exchanges parameters to adjust polynomials to generate/cancel keys.
Compared to previous works [5, 6], the salient advantages of our work are as follows:
SSKM establishes a relocatable key mechanism based on the secret sharing theory, which hides keys into secret and recovers them when needed; SSKM adopts hierarchical architecture which is suitable for the secret sharing mechanism and localizes the security and reduces energy consumption. It makes the SSKM key management feasible; SSKM presents an authentication mechanism based on the secret sharing theory, which supports the scalability (join or leave).
The rest of this paper is organized as follows. Section 2 describes the related work, Section 3 presents the system model and assumption, Section 4 describes the secret sharing key management in detail, and Section 5 evaluates SSHM using security analysis. Finally, we end the paper with a conclusion as well as the further work in Section 6.
2. Related Work
In 1979, Shamir [14] and Blakley [15] proposed the secret sharing method based on the Lagrange interpolation formula and the nature of the vector space, respectively. Proposition: given
One also defines the Lagrange coefficient
A
In [5], the authors present a low-cost secret-sharing scheme for sensor network. This paper provides basic building blocks to establish secure communication through exchanging secret keys between neighbor nodes without any cryptography methods. In [5], authors also design a second algorithm which extends the secret key establishment. However, due to the exchange happening among sensors, it consumes lots of energy. Moreover, the authentication between neighbor nodes also needs to exchange large messages, which makes it unsuitable for wireless sensor network.
In [6], authors presented some schemes to secure data aggregation based on secret sharing and information dispersal. In these schemes, sensor nodes split messages into subshares and forward them among several disjoint paths to defend DoS attack, eavesdropping attack, and tampering attack. They design a secret multipath aggregation (SMA) mechanism which applies secret sharing to create shares to deal with security under the contingency of node compromise. However, these schemes are not feasible for heavy energy consumption. On one hand, they want data aggregation using secret sharing; on the other hand, they have to distribute key things and messages to confuse the enemy, so that the adversary cannot find the real route, which needs a large number of messages exchange.
Comparing with previous works, our solution adopts the hierarchical network and localizes the communication and security. Also, we ingeniously use the base station to carry complicated things out, which can reduce the energy consumption.
3. System Model
3.1. Network Model
The wireless sensor network is energy sensitive. Therefore, we adopt the maximum energy cluster head (MECH) protocol for our network architecture [1]. The MECH is an LEACH-like protocol (LEACH: low energy adaptive clustering hierarchy) [2] which divides the network into clusters.
As shown in Figure 1, in the MECH architecture, the sensors self-organize into some clusters and act as two types of roles: cluster heads and member nodes. In each cluster, one node as a CH manages the cluster and deals with information from member nodes forward to the base station (BS). MECH constructs clusters based on radio range and the number of cluster members. The cluster topology in the network is distributed more equally through our cluster constructing; that is, nodes in each cluster do not exceed a certain threshold.

The network system.
3.2. Assumptions
In the considered network, we consumed the following.
All sensor nodes are static. Each sensor has a unique ID assigned by the base station. Each sensor has the same capabilities in energy, computation, radio range, and so forth. If a node is compromised, all of the key things in the node are revealed [7]. Each sensor is in, and only in, one cluster. The BS can communicate with all sensors in the network.
3.3. Notations
In Table 1, we list some notations used in this paper.
Notations.
4. The Secret Sharing-Based Key Management
In this section, we describe the secret sharing-based key management (SSKM) in detail. After deployment, the base station assigns each sensor an initial key

The key architecture.
4.1. Preliminaries
After deployment, the BS randomly chooses an integer, relatively primes with
Shamir's
(1) share generation phase: dealer D randomly selects a polynomial
(2) secret reconstruct phase: any t shares
We find that the above scheme satisfies the basic security requirement of secret sharing scheme: any t shares or more than t shares can reconstruct the secret S; fewer than there must be a secure channel for delivering shares between dealer and users;
4.2. Initial Phase
Once wireless sensor network has been deployed and sensors self-organized into clusters, BS starts to form the key system as follows.
Firstly, BS chooses two big primes Assume that during each session period
Equation (5) is used to key distribute between BS and cluster head. And other BS independently selects M session keys

The initial phase.
4.3. Network Key Management
The network key is the session key between the BS and cluster heads to protect their communication.
The key shares distribution process is as follow.
During the session period Given that R indicates the set of revoked CHs during the session period l and before, let BS broadcasts the information
The network key process is shown in Figure 4.

The network in session l.
The session key recovery process is as follows.
Having received the key materials, cluster heads calculate their individual share Using
4.4. Cluster Key Management
In this phase, the protocol establishes the cluster key between CH and members. Similar to the network key, the cluster key can be generated as follows.
(1) Firstly, cluster head chooses
Furthermore, the BS utilizes CH's
(2) Given that R indicates the set of revoked sensors during the session period l and before, let
(3) Then, BS independently selects M session keys

The cluster key process.
4.5. Secret Recovery
Depending on the received information from base station, public generator, node's private key
4.6. Scalability
In our solution, we also consider the scalability of network.
4.6.1. New Member Join
When a new member
4.6.2. Node Isolation
Once CH or neighbor nodes find a compromised node
5. Security Analyses
Due to the unreliable wireless environment, dynamic clustering cluster key distribution scheme is subject to a variety of attacks, such as eavesdropping, tampering, and replay attacks. Compared to previous works, the salient advantage of our solution is that we addressed challenging runtime security issues using localizing key things and group key management based on secret sharing mechanism.
5.1. Robustness
In the recovery phase, for any user
Furthermore, assume that any set
Moreover, because the cluster session key
5.2. Tolerance
The normal user
5.3. Security
Our solution also has both
5.3.1.
Forward Secrecy
Let
5.3.2.
Backward Secrecy
Let
5.4. Complexity Analysis
In this section, we discuss the complexity of our scheme from computation complexity, communication complexity, and storage cost needed by common node and cluster.
Computation complexity: we assume that base station has a large computation capacity, the pickout of polynomial and share distribution as well as the choice of generator. Common node only needs to compute division, and cluster head needs to reconstruct the polynomial beside division. Communication costs include the broadcast cost: Storage cost: in our scheme, we only need to save a private respective key, which is
6. Conclusion and Future Work
In this paper, we propose a secret sharing-based key management scheme (SSKM) to enhance network security and survivability. Different from previous works, although we employ the hierarchical architecture, we limited the size of clusters to balance the overall energy consumption of the network. In contrast to other clustered architectural security solutions, the salient advantage of this work is that we addressed challenging security issues by localizing key things based on secret sharing theory. We present the network key and cluster key and generate new keys from various polynomials by Lagrange interpolation formula. Also, we present a rekey mechanism in the cluster head selection with low energy consumption. Meanwhile, SSKM has an authentication mechanism to ensure the scalability, which cannot only authenticate the new sensor but also can isolate the compromised node. The security analysis shows that our solution cannot only reduce the energy consumption effectively but also enhance the security level. In the future, we will focus on how to enhance security in mobile and scalable WSNs.
Footnotes
Acknowledgments
This work was supported by China Postdoctoral Science Foundation Funded Project (2012M510367); the National Basic Research Program of China (973 Program) (2011CB302900).
