{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:37:53Z","timestamp":1760240273570,"version":"build-2065373602"},"reference-count":63,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T00:00:00Z","timestamp":1555891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["1437-35"],"award-info":[{"award-number":["1437-35"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless Sensor Network (WSN) is a growing area of research in terms of applications, life enhancement and security. Research interests vary from enhancing network performance and decreasing overhead computation to solving security flaws. Secure Group Communication (SGC) is gaining traction in the world of network security. Proposed solutions in this area focus on generating, sharing and distributing a group key among all group members in a timely manner to secure their communication and reduce the computation overhead. This method of security is called SGC-Shared Key. In this paper, we introduce a simple and effective way to secure the network through Hashed IDs (SGC-HIDs). In our proposed method, we distribute a shared key among the group of nodes in the network. Each node would have the ability to compute the group key each time it needs to. We provide a security analysis for our method as well as a performance evaluation. Moreover, to the best of our knowledge, we present for the first time a definition of joining or leaving attack. Furthermore, we describe several types of such an attack as well as the potential security impacts that occur when a network is being attacked.<\/jats:p>","DOI":"10.3390\/s19081909","type":"journal-article","created":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T11:02:53Z","timestamp":1555930973000},"page":"1909","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4556-1392","authenticated-orcid":false,"given":"Hisham N.","family":"AlMajed","sequence":"first","affiliation":[{"name":"Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8253-9709","authenticated-orcid":false,"given":"Ahmad S.","family":"AlMogren","sequence":"additional","affiliation":[{"name":"Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2019,4,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1007\/s11277-017-4909-5","article-title":"Intrusion Detection at International Borders and Large Military Barracks with Multi-Sink Wireless Sensor Networks: An Energy Efficient Solution","volume":"98","author":"Ghosh","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_2","first-page":"80","article-title":"A certificateless aggregate signature scheme for healthcare wireless sensor network","volume":"18","author":"Kumar","year":"2018","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"ref_3","unstructured":"Doboli, A., Curiac, D., Pescaru, D., Doboli, S., Tang, W., Volosencu, C., Gilberti, M., Banias, O., and Istin, C. (2018). Cities of the future: Employing wireless sensor networks for efficient decision making in complex environments. arXiv."},{"key":"ref_4","first-page":"83","article-title":"Internet of things (IoT) in Agriculture\u2014Selected Aspects","volume":"8","author":"Stoces","year":"2016","journal-title":"AGRIS On-Line Pap. Econ. Inform."},{"key":"ref_5","unstructured":"Ravi, P., and Kumar, N. (2018, January 28). Internet of Things (IoT): A Revolutionary Approach towards Healthcare Surveillance. Proceedings of the 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics, Karnataka, India."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Mihovska, A., and Sarkar, M. (2018). Smart connectivity for internet of things (IoT) applications. New Advances in the Internet of Things, Springer.","DOI":"10.1007\/978-3-319-58190-3_7"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1007\/s13198-018-0727-8","article-title":"IoT enabled tracking and monitoring sensor for military applications","volume":"9","author":"Iyer","year":"2018","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"15550","DOI":"10.1109\/ACCESS.2018.2809778","article-title":"An Innovative Heuristic Algorithm for IoT-Enabled Smart Homes for Developing Countries","volume":"6","author":"Hussain","year":"2018","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Aditia, M.K., Altaf, F., Singh, M.R., Burra, M.S., Maurya, C., Sahoo, S.S., and Maity, S. (2019, January 4\u20137). Optimized CL-PKE with lightweight encryption for resource constrained devices. Proceedings of the 20th International Conference on Distributed Computing and Networking, Bangalore, India.","DOI":"10.1145\/3288599.3296014"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"8936","DOI":"10.1109\/TIE.2018.2808925","article-title":"Predicting the batteries State of Health in Wireless Sensor Networks applications","volume":"65","author":"Lajara","year":"2018","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_11","unstructured":"Chelli, K. (2015, January 28\u201330). Security issues in wireless sensor networks: Attacks and countermeasures. Proceedings of the World Congress on Engineering, Tampere, Finland."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1504\/IJBET.2018.089967","article-title":"Burst communication by using self-adaptive buffer allocation with energy-efficient in-body sensor networks","volume":"26","author":"Sangeethapriya","year":"2018","journal-title":"Int. J. Biomed. Eng. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Xiao, L., Meng, Y., and Wu, K. (2018, January 7\u20139). Adaptive Compressed Classification for Energy Efficient Activity Recognition in Wireless Body Sensor Networks. Proceedings of the 2018 4th International Conference on Big Data Computing and Communications (BIGCOM), Chicago, IL, USA.","DOI":"10.1109\/BIGCOM.2018.00013"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Azar, J., Darazi, R., Habib, C., Makhoul, A., and Demerjian, J. (2018, January 25\u201329). Using DWT Lifting Scheme for Lossless Data Compression in Wireless Body Sensor Networks. Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus.","DOI":"10.1109\/IWCMC.2018.8450459"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Korde, M.N., and Deshmukh, U. (2018). Energy and QoS Efficient Algorithm for Wireless Body Area Networks. Energy, 6.","DOI":"10.17148\/IJIREEICE.2018.61110"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Patil, V.S., Mane, Y.B., and Deshpande, S. (2019). FPGA Based Power Saving Technique for Sensor Node in Wireless Sensor Network (WSN). Computational Intelligence in Sensor Networks, Springer.","DOI":"10.1007\/978-3-662-57277-1_16"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1109\/JSEN.2018.2878788","article-title":"iDEG: Integrated Data and Energy Gathering Framework for Practical Wireless Sensor Networks Using Compressive Sensing","volume":"19","author":"Jain","year":"2019","journal-title":"IEEE Sens. J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.inffus.2018.08.005","article-title":"Energy-aware scheduling for information fusion in wireless sensor network surveillance","volume":"48","author":"Xiao","year":"2019","journal-title":"Inf. Fusion"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Elhoseny, M., and Hassanien, A.E. (2019). An Encryption Model for Data Processing in WSN. Dynamic Wireless Sensor Networks, Springer.","DOI":"10.1007\/978-3-319-92807-4"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bajaber, F., and Awan, I. (2008, January 8\u201310). Dynamic\/static clustering protocol for wireless sensor network. Proceedings of the Second UKSIM European Symposium on Computer Modeling and Simulation, Liverpool, UK.","DOI":"10.1109\/EMS.2008.22"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"672968","DOI":"10.1155\/2014\/672968","article-title":"Collusion based realization of trust and reputation models in extreme fraudulent environment over static and dynamic wireless sensor networks","volume":"10","author":"Verma","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Iqbal, U., and Shafi, S. (2019). A Provable and Secure Key Exchange Protocol Based on the Elliptical Curve Diffe\u2013Hellman for WSN. Advances in Big Data and Cloud Computing, Springer.","DOI":"10.1007\/978-981-13-1882-5_31"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s11277-019-06132-4","article-title":"Fuzzy Genetic Elliptic Curve Diffie Hellman Algorithm for Secured Communication in Networks","volume":"105","author":"Sethuraman","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Abiramy, N., and Sudha, S. (2019). Abiramy, N.; Sudha, S. A Secure and Lightweight Authentication Protocol for Multiple Layers in Wireless Body Area Network. Smart Intelligent Computing and Applications, Springer.","DOI":"10.1007\/978-981-13-1921-1_29"},{"key":"ref_25","first-page":"17305","article-title":"IoT Based Industrial Parameters Monitoring and Alarming System using Arduino-A Novel Approach","volume":"2018","author":"Lalwani","year":"2018","journal-title":"Int. J. Eng. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.techfore.2018.09.029","article-title":"Blending internet-of-things (IoT) solutions into relationship marketing strategies","volume":"137","author":"Lo","year":"2018","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.jpdc.2018.09.011","article-title":"Workload aware VM consolidation method in edge\/cloud computing for IoT applications","volume":"123","author":"Mohiuddin","year":"2019","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.asoc.2018.06.017","article-title":"Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks","volume":"71","author":"Huda","year":"2018","journal-title":"Appl. Soft Comput."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Almogren, A. (2018). An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology. Cluster Computing, Springer.","DOI":"10.1007\/s10586-017-1591-z"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Chuang, I.H., Su, W.T., Wu, C.Y., Hsu, J.P., and Kuo, Y.H. (2007, January 11\u201315). Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks. Proceedings of the Wireless Communications and Networking Conference, Hong Kong, China.","DOI":"10.1109\/WCNC.2007.757"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yousefpoor, M.S., and Barati, H. (2018). Dynamic key management algorithms in wireless sensor networks: A survey. Comput. Commun.","DOI":"10.1016\/j.comcom.2018.11.005"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1109\/TII.2013.2288063","article-title":"Key management for static wireless sensor networks with node adding","volume":"10","author":"Gandino","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1831","DOI":"10.1002\/cpe.3153","article-title":"A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks","volume":"28","author":"Boumerzoug","year":"2016","journal-title":"Concurr. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/j.future.2018.06.053","article-title":"Identifying cyber threats to mobile-IoT applications in edge computing paradigm","volume":"89","author":"Abawajy","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_35","unstructured":"Haddadi, H., Christophides, V., Teixeira, R., Cho, K., Suzuki, S., and Perrig, A. (2018, January 14\u201318). SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security. Proceedings of the 1st International Workshop on Security and Privacy for the Internet-of-Things, Sydney, NSW, Australia."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","article-title":"Internet of Things security and forensics: Challenges and opportunities","volume":"78","author":"Conti","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_37","first-page":"17","article-title":"A Review on Security Challenges and Features in Wireless Sensor Networks: IoT Perspective","volume":"10","author":"Burhanuddin","year":"2018","journal-title":"J. Telecommun. Electron. Comput. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"74260","DOI":"10.1109\/ACCESS.2018.2883426","article-title":"A Secure and Efficient Certificateless Authentication Scheme with Unsupervised Anomaly Detection in VANETs","volume":"6","author":"Tan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"7978027","DOI":"10.1155\/2018\/7978027","article-title":"Secure certificateless authentication and road message dissemination protocol in VANETs","volume":"2018","author":"Tan","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/JSYST.2015.2428620","article-title":"Certificateless public auditing scheme for cloud-assisted wireless body area networks","volume":"12","author":"He","year":"2018","journal-title":"IEEE Syst. J."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"3618","DOI":"10.1109\/TII.2017.2771382","article-title":"Certificateless public key authenticated encryption with keyword search for industrial internet of things","volume":"14","author":"He","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TIFS.2014.2375555","article-title":"Effective key management in dynamic wireless sensor networks","volume":"10","author":"Seo","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"e3363","DOI":"10.1002\/dac.3363","article-title":"An ECC-based authenticated group key exchange protocol in IBE framework","volume":"30","author":"Gupta","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Tan, H., and Chung, I. (2018). A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs. Sensors, 18.","DOI":"10.3390\/s18113930"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1016\/j.future.2018.07.009","article-title":"Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications","volume":"89","author":"Guo","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Alshammari, M., and Elleithy, K. (2018). Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18103569"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: Security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","journal-title":"Wirel. Netw."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Huang, H., Gong, T., Chen, T., Xiong, M., Pan, X., and Dai, T. (2016). An Improved \u03bcTESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs. J. Sens., 2016.","DOI":"10.1155\/2016\/9021650"},{"key":"ref_49","first-page":"39","article-title":"Wireless Control System: Design, Development and Application on Industrial Boiler","volume":"10","year":"2014","journal-title":"Revista Ra Ximhai"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.adhoc.2015.03.002","article-title":"How to choose an experimentation platform for wireless sensor networks? A survey on static and mobile wireless sensor network experimentation facilities","volume":"30","author":"Tonneau","year":"2015","journal-title":"Ad Hoc Netw."},{"key":"ref_51","first-page":"8459","article-title":"Dynamic WSN Using Efficient Clustering and Secure Routing","volume":"4","author":"Jain","year":"2016","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Kaps, J.P., and Sunar, B. (2006, January 1\u20134). Energy comparison of AES and SHA-1 for ubiquitous computing. Proceedings of the International Conference on Embedded and Ubiquitous Computing, Seoul, Korea.","DOI":"10.1007\/11807964_38"},{"key":"ref_53","first-page":"10","article-title":"Implementation of AES with Time Complexity Measurement for Various Input","volume":"15","author":"More","year":"2015","journal-title":"Glob. J. Comput. Sci. Technol. E Netw. Web Secur."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Sarvabhatla, M., Kodavali, L.N., and Vorugunti, C.S. (2014, January 18\u201321). An Energy efficient temporal credential based mutual authentication scheme for WSN. Proceedings of the 2014 3rd International Conference on Eco-Friendly Computing and Communication Systems (ICECCS), Mangalore, India.","DOI":"10.1109\/Eco-friendly.2014.90"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.jnca.2018.03.023","article-title":"Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization","volume":"112","author":"Sun","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Maidhili, R., and Karthik, G. (2018, January 4\u20136). Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks. Proceedings of the 2018 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India.","DOI":"10.1109\/ICCCI.2018.8441228"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"24","DOI":"10.5121\/ijp2p.2011.2203","article-title":"A comparison of physical attacks on wireless sensor networks","volume":"2","author":"Mohammadi","year":"2011","journal-title":"Int. J. Peer Peer Netw."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.1002\/sec.1140","article-title":"An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks","volume":"8","author":"Chatterjee","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.jnca.2015.10.011","article-title":"Secure group communication in wireless sensor networks: A survey","volume":"61","author":"Cheikhrouhou","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","article-title":"A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks","volume":"321","author":"He","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","article-title":"A robust mutual authentication protocol for wireless sensor networks","volume":"32","author":"Chen","year":"2010","journal-title":"ETRI J."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thom\u00e9, E., and Valenta, L. (2015, January 12\u201316). Imperfect forward secrecy: How Diffie-Hellman fails in practice. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA.","DOI":"10.1145\/2810103.2813707"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Ray, S., and Biswas, G. (2012, January 4\u20136). Establishment of ECC-based initial secrecy usable for IKE implementation. Proceedings of the World Congress on Expert Systems (WCE), London, UK.","DOI":"10.1016\/j.protcy.2012.05.083"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/8\/1909\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:46:20Z","timestamp":1760186780000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/8\/1909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,22]]},"references-count":63,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2019,4]]}},"alternative-id":["s19081909"],"URL":"https:\/\/doi.org\/10.3390\/s19081909","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,4,22]]}}}