{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:07:13Z","timestamp":1760242033645,"version":"build-2065373602"},"reference-count":20,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total number of nodes in the network. An example is represented by the schemes based on combinatorial design. These schemes use specific rules for the generation of sets of keys that are distributed to the nodes before deploying the network. The aim of these approaches is to improve the resilience of the network. However, the quantity of data that must be stored by each node is proportional to the number of nodes of the network, so the available memory affects the applicability of these schemes. This paper investigates the opportunity of reducing the storage overhead by distributing the same set of keys to more than one node. In addition, the presence of redundant sets of keys affects the resilience and the security of the network. A careful analysis is conducted to evaluate benefits and drawbacks of redundant key distribution approaches. The results show that the use of redundancy decreases the level of resilience, but it scales well on very large networks.<\/jats:p>","DOI":"10.3390\/cryptography2040040","type":"journal-article","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T03:36:41Z","timestamp":1544413001000},"page":"40","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Redundancy in Key Management for WSNs"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5581-1159","authenticated-orcid":false,"given":"Filippo","family":"Gandino","sequence":"first","affiliation":[{"name":"Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0065-8614","authenticated-orcid":false,"given":"Bartolomeo","family":"Montrucchio","sequence":"additional","affiliation":[{"name":"Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7135-7694","authenticated-orcid":false,"given":"Maurizio","family":"Rebaudengo","sequence":"additional","affiliation":[{"name":"Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Abielmona, R., Falcon, R., Zincir-Heywood, N., and Abbass, H.A. (2016). A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks. Recent Advances in Computational Intelligence in Defense and Security, Springer International Publishing.","DOI":"10.1007\/978-3-319-26450-9"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4781","DOI":"10.3390\/s150304781","article-title":"Refrigerated Fruit Storage Monitoring Combining Two Different Wireless Sensing Technologies: RFID and WSN","volume":"15","author":"Villalba","year":"2015","journal-title":"Sensors"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Wang, X., Mateti\u0107, M., Zhou, H., Zhang, X., and Jemri\u0107, T. (2017). Postharvest Quality Monitoring and Variance Analysis of Peach and Nectarine Cold Chain with Multi-Sensors Technology. Appl. Sci., 7.","DOI":"10.31219\/osf.io\/cfr72"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Alvarez, R., Caballero-Gil, C., Santonja, J., and Zamora, A. (2017). Algorithms for Lightweight Key Exchange. Sensors, 17.","DOI":"10.3390\/s17071517"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/COMST.2015.2459691","article-title":"A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks","volume":"18","author":"Shim","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Gandino, F., Celozzi, C., and Rebaudengo, M. (2017). A Key Management Scheme for Mobile Wireless Sensor Networks. Appl. Sci., 7.","DOI":"10.3390\/app7050490"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2591","DOI":"10.1016\/j.comnet.2010.04.010","article-title":"A survey on key management mechanisms for distributed Wireless Sensor Networks","volume":"54","author":"Barreto","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.jnca.2012.12.010","article-title":"Dynamic key management in wireless sensor networks: A survey","volume":"36","author":"He","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., and Gligor, V. (2002, January 18\u201322). A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS \u201902, Washington, DC, USA.","DOI":"10.1145\/586115.586117"},{"key":"ref_10","unstructured":"Chan, H., Perrig, A., and Song, D. (2003, January 11\u201314). Random key predistribution schemes for sensor networks. Proceedings of the Symposium on Security and Privacy, Berkeley, CA, USA."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Colbourn, C.J., and Dinitz, J.H. (2006). Handbook of Combinatorial Designs, CRC Press.","DOI":"10.1201\/9781420010541"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Chee, Y.M., Li, C., Ling, S., Wang, H., and Xing, C. (2009). On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. Coding and Cryptology, Springer.","DOI":"10.1007\/978-3-642-01877-0"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Samarati, P., Ryan, P., Gollmann, D., and Molva, R. (2004). Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. Computer Security\u2014ESORICS 2004, Springer.","DOI":"10.1007\/b100085"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TNET.2007.892879","article-title":"Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks","volume":"15","author":"Camtepe","year":"2007","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Srinivasa, K.G., Poornima, V., Archana, V., Reshma, C., Venugopal, K.R., and Patnaik, L.M. (2008, January 14\u201317). Combinatorial Approach to Key Generation using Multiple Key Spaces for Wireless Sensor Networks. Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, Chennai, India.","DOI":"10.1109\/ADCOM.2008.4760461"},{"key":"ref_16","unstructured":"Lee, J., and Stinson, D.R. (2005, January 13\u201317). A combinatorial approach to key predistribution for distributed sensor networks. Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., and de Mello, R.F. (2007). Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks. Parallel and Distributed Processing and Applications, Springer.","DOI":"10.1007\/978-3-540-74742-0"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1109\/TWC.2012.010413.120732","article-title":"A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks","volume":"12","author":"Bechkit","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2224","DOI":"10.1109\/TC.2012.138","article-title":"Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications","volume":"62","author":"Ruj","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TIFS.2016.2601061","article-title":"A Key Distribution Scheme for Mobile Wireless Sensor Networks: q - s -Composite","volume":"12","author":"Gandino","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/4\/40\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:32:15Z","timestamp":1760196735000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/4\/40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":20,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,12]]}},"alternative-id":["cryptography2040040"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2040040","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2018,12,8]]}}}