Mendeley TY _ JOUR ID - 13980920203979 TI - Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks JO - Journal of Information Systems and Telecommunication (JIST) JA - ES LA - en SN - 2322-1437 AU - Modiri Vahid AU - Haj Seyyed Javadi Hamid AU - Rahmani Amir Masoud AU - Anzani Mohaddese AD - Science and research Islamic Azad University AD - دانشگاه شاهد AD - Science and Research Branch, Islamic Azad University AD - Shahed University Y1 - 2020 PY - 2020 VL - 29 IS - SP - 53 EP - 61 KW - Wireless sensor networks KW - KW - Key pre-distribution KW - KW - Residual Design KW - KW - Hierarchical network model KW - DO - N2 - Combinatorial designs are powerful structures for key management in wireless sensor networks to address good connectivity and also security against external attacks in large scale networks. Many researchers have used key pre-distribution schemes using combinatorial structures in which key-rings, are pre-distributed to each sensor node before deployment in a real environment. Regarding the restricted resources, key distribution is a great engagement and challenging issue in providing sufficient security in wireless sensor networks. To provide secure communication, a unique key should be found from their stored key-rings. Most of the key pre-distribution protocols based on public-key mechanisms could not support highly scalable networks due to their key storage overhead and communication cost that linearly increasing. In this paper, we introduce a new key distribution approach for hierarchical clustered wireless sensor networks. Each cluster has a construction that contains new points or that reinforces and builds upon similar ideas of their head clusters. Based on Residual Design as a powerful algebraic combinatorial architecture and hierarchical network model, our approach guarantees good connectivity between sensor nodes and also cluster heads. Compared with similar existing schemes, our approach can provide sufficient security no matter if the cluster head or normal sensor node is compromised UR - rimag.ir/en/Article/15399 L1 - rimag.ir/en/Article/Download/15399 ER -