The Internet of Things (IoT) aims to connect massive sensing devices through wireless networks to realize information interaction between the physical world and the virtual world. Wireless sensor networks, which have emerged as a result of advancements in wireless communication, micro electro-mechanical systems technology, and electronics, offer a wide range of future applications. In many circumstances, appropriate key management is required for networking security. The mechanism used to tackle the challenge of creating, establishing, distributing, and maintaining secret session keys is known as key management. Authentication and key exchange in IoT faces major challenges owing in part to the fact that constituent devices are resource constrained, deployed in environments where physical access to devices is possible. We describe ideas and strategies for designing authenticated key management systems for wireless sensor networks in an IoT environment. In this paper, we address several aspects related to pairwise key management, group key and establishment including issues related to authentication in existing literature. We also discussed literature on the design and implementation of lightweight group key management protocols that can be deployed in various IoT group applications along with research directions.

1.
Lu
K.
,
Qian
Y.
,
Guizani
M.
,
Chen
H.H.
(
2008
)
A framework for a distributed key management scheme in heterogeneous wireless sensor networks
.
IEEE Trans WirelCommun
7
(
2
):
639
647
34.
2.
X.
Fan
and
G.
Gong
(
2015
)
LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks
,”
In proceeding of International Conference on Ad Hoc Networks
, pp.
180
195
.
3.
Gubbi
,
J.
,
Buyya
,
R.
,
Marusic
,
S.
, &
Palaniswami
,
M.
(
2013a
).
Internet of Things (IoT): A vision, architectural elements, and future directions
.
Future Generation Computer Systems
,
29
(
7
),
1645
1660
.
4.
Gubbi
,
J.
,
Buyya
,
R.
,
Marusic
,
S.
, &
Palaniswami
,
M.
(
2013b
).
Internet of Things (IoT): A vision, architectural elements, and future directions
.
Future Generation Computer Systems
,
29
(
7
),
1645
1660
.
5.
Ko
,
I. Y.
,
Ko
,
H. G.
,
Molina
,
A. J.
, &
Kwon
,
J. H.
(
2016
).
SoIoT: Toward a user-centric IoT-based service framework
.
ACM Transactions on Internet Technology (TOIT)
,
16
(
2
),
1
21
.
6.
Chen
,
S. Y.
,
Song
,
S. F.
,
Li
,
L. X.
, &
Shen
,
J.
(
2009
).
Survey on smart grid technology
.
Power System Technology
,
8
,
1
7
.
7.
Shin
,
D.
,
Sharma
,
V.
,
Kim
,
J.
,
Kwon
,
S.
, &
You
,
I.
(
2017
).
Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks
.
IEEE Access : Practical Innovations, Open Solutions
,
5
,
11100
11117
.
8.
Zhang
,
M.
,
Wang
,
C.
,
Wang
,
J.
,
Tian
,
S.
, &
Li
,
Y.
(
2018
).
A new approach to security analysis of smart home authentication systems
.
Fundamental Informatica
,
157
(
1-2
),
153
165
.
9.
Moosavi
,
S. R.
,
Gia
,
T. N.
,
Rahmani
,
A. M.
,
Nigussie
,
E.
,
Virtanen
,
S.
,
Isoaho
,
J.
,
Tenhunen
,
H.
(
2015
).
SEA: secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways
.
Procedia Computer Science
,
52
,
452
459
.
10.
J.
Liu
,
Y.
Xiao
and
C.L. Philip
Chen
,
Authentication and Access Control in the Internet of Things, ICDCSW
,
2012
, 2013
IEEE 33rd International Conference on Distributed Computing Systems Workshops
2012, pp.
588
592
.
11.
S.
Sciancalepore
,
A.
Capossele
,
G.
Piro
,
G.
Boggia
and
G.
Bianchi
,
Key Management Protocol with Implicit Certificates for IoT systems, IoT-Sys 15 Proceedings of the
2015
Workshop on IoT challenges in Mobile and Industrial Systems
, 2015, pp.
37
42
.
12.
Z.
Drias
,
A.
Serhrouchni
and
O.
Vogel
(
2017
), “Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems(ICS),” 2017
1st Cyber Security in Networking Conference (CSNet)
,
Rio de Janeiro
, pp.
1
10
, doi: .
13.
Pramod
T. C.
,
Thejas
G. S.
,
S. S.
Iyengar
,
N. R.
Sunitha
(
2019
),
CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems
,
Future Internet
, vol-
11
, issue-
126
.
14.
B.D.
Deebak
(
2020
),
Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems
,
Sustainable Cities and Society
, Volume
63
,
102416
, ISSN 2210-6707.
15.
Kübra
Seyhan
,
Tu N.
Nguyen
,
Sedat
Akleylek
,
Korhan
Cengiz
,
S.K. Hafızul
Islam
(
2021
),
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
,
Journal of Information Security and Applications
, Volume
58
,
102788
, ISSN 2214-2126.
16.
Olakanmi Oladayo
Olufemi
,
Odeyemi Kehinde
Oluwasesan
(
2021
),
Faster and efficient cloud-server-aided data deduplication scheme with an authenticated key agreement for Industrial Internet-of-Things
,
Internet of Things
,
100376
, ISSN 2542-6605.
17.
H.
Chan
,
A.
Perrig
, and
D.
Song
(
2003
)
Random key predistribution schemes for sensor networks
,
“In Proceeding of Security and Privacy Symposium
, pp.
197
213
23.
18.
Du
W.
,
Deng
J.
,
Han
Y.S.
,
Varshney
P.K.
,
Katz
J.
,
Khalili
A.
(2005)
A pair-wise key predistribution scheme for wireless sensor networks
.
ACM Trans Inform Syst Secur (TISSEC)
8
(
2
):
228
258
24.
19.
Gandino
F.
,
Montrucchio
B.
,
Rebaudengo
M.
(
2009
)
Key management for static wireless sensor networks with node adding
.
IEEE Trans Ind Inform
10
(
2
):
1133
1143
.
20.
J.
Zhang
and
V.
Varadharajan
, ‘
‘Wireless sensor network key management survey and taxonomy,’
J. Netw. Comput. Appl.
, vol.
33
, no.
2
, pp.
63
75
,
2010
.
21.
Rahman
and
E.
Dijk
. (Oct.
2014
).
Group Communication for the Constrained Application Protocol (CoAP)
. [Online]. Available: https://tools.ietf.org/html/rfc7390
22.
L.
Harn
and
C.
Lin
, ‘
‘Authenticated group key transfer protocol based on secret sharing,’
IEEE Trans. Comput.
, vol.
59
, no.
6
, pp.
842
846
, Jun.
2010
.
23.
J.-H.
Son
,
J.-S.
Lee
, and
S.-W.
Seo
, ‘
‘Topological key hierarchy for energy-efficient group key management in wireless sensor networks,’
Wireless Pers. Commun.
, vol.
52
, no.
2
, pp.
359
382
,
2010
.
24.
C.-Y.
Lee
,
Z.-H.
Wang
,
L.
Harn
, and
C.-C.
Chang
, ‘
‘Secure key transfer protocol based on secret sharing for group communications,’
IEICE Trans. Inf. Syst.
, vol.
94
, no.
11
, pp.
2069
2076
,
2011
.
25.
P.
Porambage
,
C.
Schmitt
,
P.
Kumar
,
A.
Gurtov
, and
M.
Ylianttila
, ‘
‘PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications,’
Int.J. Distrib. Sensor Netw.
, vol.
2014
, Jul. 2014, Art. ID
357430
.
26.
Q.
Ren
and
G.
Yao
, “
An energy-efficient cluster head selection scheme for energy-harvesting wireless sensor networks
,”
Sensors
, vol.
20
, p.
187
,
2020
.
27.
G.
Mehmood
,
M. Z.
Khan
,
A.
Waheed
,
M.
Zareei
, and
E. M.
Mohamed
, “
A trust-based energy-efficient and reliable communication scheme (Trust-Based ERCS) for remote patient monitoring in wireless body area networks
,”
IEEE Access
, vol.
8
, pp.
2169
3536
,
2020
.
28.
C.
Chunka
,
S.
Banerjee
, and
R. S.
Goswami
, “
An efficient user authentication and session key agreement in wireless sensor network using smart card
,”
Wireless Personal Communications
, vol.
117
,
2021
.
29.
Dinker
A.G.
,
Sharma
V.
(
2019
)
Polynomial and matrix-based key management security scheme in wireless sensor networks
.
J Discret Math Sci Cryptography
22
(
8
):
1563
1575
30.
H.
Chan
,
A.
Perrig
, and
D.
Song
(
2003
)
Random key predistribution schemes for sensor networks
,
“In Proceeding of Security and Privacy Symposium
, pp.
197
213
31.
Du
W.
,
Deng
J.
,
Han
Y.S.
,
Varshney
P.K.
,
Katz
J.
,
Khalili
A.
(
2005
)
A pairwise key predistribution scheme for wireless sensor networks
.
ACM Trans Inform Syst Secur (TISSEC)
8
(
2
):
228
258
32.
Gandino
F.
,
Montrucchio
B.
,
Rebaudengo
M.
(
2009
)
Key management for static wireless sensor networks with node adding
.
IEEE Trans Ind Inform
10
(
2
):
1133
1143
33.
Zhu
S.
,
Setia
S.
,
Jajodia
S.
(
2006
)
LEAP+: Efcient security mechanisms for large-scale distributed sensor networks
.
ACM Trans Sens Netw (TOSN)
.
2
(
4
):
500
528
34.
Younis
M.F.
,
Ghumman
K.
,
Eltoweissy
M.
(
2006
)
Location-aware combinatorial key management scheme for clustered sensor networks
.
IEEE Trans Parallel Distrib Syst
17
(
8
):
865
882
35.
Choi
J.
,
Bang
J.
,
Kim
L.
,
Ahn
M.
,
Kwon
T.
(
2015
)
Location-based key management strong against insider threats in wireless sensor networks
.
IEEE Syst J
11
(
2
):
494
502
36.
Qin
Z.
,
Zhang
X.
,
Feng
K.
,
Zhang
Q.
,
Huang
J.
(
2015
)
An efcient key management scheme based on ECC and AVL tree for large scale wireless sensor networks
.
Int J Distrib Sens Netw
11
(
9
):
691498
37.
Yao
W.
,
Han
S.
,
Li
X.
(
2015
)
LKH++ based group key management scheme for wireless sensor network
.
Wirel Pers Commun
83
(
4
):
3057
3073
38.
Swaminathan
A.
,
Vivekanandan
P.
(
2017
)
An effective lightweight key management (ELWKM) model for wireless sensor networks using distributed spanning tree structure
.
Asian J Res Soc Sci Human
7
(
2
):
749
770
39.
H. C.
Chen
and
A.
Christiana
(
2017
)
A role-based RSA key management approach in a hierarchy scheme
,
“In Proceeding of Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
, pp.
258
264
, 2017.
40.
Lu
K.
,
Qian
Y.
,
Guizani
M.
,
Chen
H.H.
(
2008
)
A framework for a distributed key management scheme in heterogeneous wireless sensor networks
.
IEEE Trans WirelCommun
7
(
2
):
639
647
41.
Wang
Q.
,
Chen
H.
,
Xie
L.
,
Wang
K.
(
2013
)
One-way hash chain based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks
.
Ad Hoc Netw
11
(
8
):
2500
2511
.
42.
A.N.
Tentu
,
Venkaiah
,
V. C.
, &
Prasad
,
V. K.
(
2018
).
CRT based multi-secret sharing schemes: revisited
.
International Journal of Security and Networks
,
13
(
1
),
1
9
.
43.
A.N.
Tentu
,
Raju
,
K.
, &
Venkaiah
,
V.
(
2019
).
Cryptanalysis of a group key transfer protocol: Generalization and countermeasures
.
Journal of Combinatorics & System Sciences
,
44
,
269
283
.
44.
Sun
X.
,
Wu
X.
,
Huang
C.
,
Xu
Z.
,
Zhong
J.
(
2016
)
Modifed access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks
.
Ad Hoc Netw
37
:
324
336
45.
Z.
Jing
,
M.
Chen
and
F.
Hongbo
(
2017
)
WSN key management scheme based on fully homomorphic encryption
,
“In proceeding of Control And Decision Conference (CCDC)
, 2017 29th Chinese, pp.
7304
7309
46.
Zhan
F.
,
Yao
N.
,
Gao
Z.
,
Tan
G.
(
2017
)
A novel key generation method for wireless sensor networks based on system of equations
.
J Netw Comput Appl
82
:
114
127
.
47.
A.
Singh
,
A.N.
Tentu
,
V. Ch
Venkaiah
,
A dynamic key management paradigm for secure wireless ad hoc network communications
,
International Journal of Information and Computer Security
, vol.
14
, pp
380
402
,
2021
.
48.
Sadra
Zargar
,
Ali
Shahidinejad
,
Mostafa
Ghobaei-Arani
,
A lightweight authentication protocol for IoT-based cloud environment
, Volume
34
, Issue
11
,
2021
.
49.
Xinghui
Zhu
,
Zhong
Ren
,
Ji
He
,
Baoquan
Ren
,
Shuangrui
Zhao
, and
Pinchang
Zhang
,
LAAP: Lightweight Anonymous Authentication Protocol for IoT Edge Devices Based on Elliptic Curve
,
Wireless Communications and Mobile Computing
Volume
2022
.
50.
Baghestani
,
Farokhlagha
Moazami
, and
Mahdi
Tahavori
Lightweight Authenticated Key Agreement for Smart Metering in Smart Grid Seyed Hamid
,
IEEE Systems Journal
, VOL.
16
, NO.
3
, September
2022
.
51.
Mahdi
Nikooghadam
,
Haleh
Amintoosi
,
Saru
Kumari
,
On the Security of “Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems
Wireless Personal Communications
(
2021
)
120
:
1
8
, 2021.
52.
Waseem
Iqbal
,
Haider
Abbas
,
Pan
Deng
,
Jiafu
Wan
, Member,
Bilal
Rauf
,
Yawar
Abbas
, and
Imran
Rashid
,
ALAM: Anonymous Lightweight Authentication Mechanism for SDN-Enabled Smart Homes
,
IEEE Internet Of Things Journal
, VOL.
8
, NO.
12
,
2021
.
53.
Sungjin
Yu
,
Ashok Kumar
Das
,
Youngho
Park
, and
Pascal
Lorenz
,
SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments
,
IEEE Transactions On Vehicular Technology
, Vol.
71
, No.
10
, October
2022
.
54.
Qi
and
J.
Chen
, “
Two-pass privacy preserving authenticated key agreement scheme for smart grid
,”
IEEE Syst. J.
, vol.
15
, no.
3
This content is only available via PDF.
You do not currently have access to this content.