International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Self-Healing Sensor Network Key Distribution Scheme for Secure Communication

Author Affiliations

  • 1 Computer Science Department, Kadi Sarva VishwaVidyalaya, Gandhinagar, Gujarat, INDIA

Res. J. Recent Sci., Volume 2, Issue (ISC-2012), Pages 158-161, February,2 (2013)


Wireless sensor network (WSN) consists of a large number of small, low cost sensor nodes which have limited computing and energy resources. As the wireless medium is characterized by its lousy nature, reliable communication is difficult to assume in the key distribution schemes. Therefore, self-healing is a good property for key distribution in wireless applications. How to establish secure session keys is one of the central tasks for wireless sensor network communications. General Key distribution schemes for traditional computer networks could not be directly shifted to wireless sensor network environments. A self-healing key distribution scheme enables a large group of sensor nodes to establish a session key dynamically over an unreliable, or lousy wireless network. The main idea of self-healing key distribution scheme is that users are capable to recover lost session keys on their own, without requesting additional transmission from the group manager that saves the additional communication cost over the network and reduces the network traffic, even if during a certain session some broadcast messages are lost due to network faults.


  1. Mewada S. and Singh U., Performance Analysis of Secure Wireless Mesh Networks, Res.J.Recent Sci., 1(3), 80-85 (2012)
  2. Wang Q., Chen H., Lei X. and Wang K., Long-lived Self-healing Group Key Distribution Scheme in Wireless Sensor Networks, Journal of Networks, 7, 1024-1030, (2012)
  3. Firdous K., Sajid H., Jong H. and Ashraf M., Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks, H. Zhang et al. (Eds.): MSN 2007, LNCS 4864, 737–748, 2007, and Springer-Verlag Berlin Heidelberg (2007)
  4. Jingyuan L., Yafeng W., John A., Sang H., Zhong Z., Tian H., Bong W. and Seong Soon J., Predictive Dependency Constraint Directed Self-Healing for Wireless Sensor Networks, IEEE Publication: 978-1-4244-7910-8/10 (2010)
  5. Biming T., Song H., Jiankun H. and Tharam D., A Mutual Healing Key Distribution Scheme in Wireless Networks, Journal of Network and Computer Applications, 34, 80-88 (2011)
  6. Biming T., Song H., Sazia P., Jiankun H. and Das S., Self-Healing Key Distribution Schemes for Wireless Networks: A Survey, Oxford University Press on behalf of The British Computer Society, March 20 (2011)
  7. Wang H. and Zhang Y., Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme, IEEE Transaction on Wireless Communications, 10(1) (2011)
  8. Roberto D., Claudio S. and Gene T., Self-Healing in Unattended Wireless Sensor Networks, ACM Transactions on Sensor Networks, 9(4), 39:1-39:19 (2010)
  9. Minghui S. and Xuemin S., Self Healing Group Wise Key Distribution Schemes With Time Limited Node Revocation for Wireless Sensor Network, Security in Wireless Mobile Ad Hoc and Sensor Networks, IEEE Wireless Communications, 38-46 (2007)
  10. Seyed Hossein N., Amir Hossein J. and Vanesa D., A Distributed Group Rekeying Scheme for Wireless Sensor Networks, ICSNC 2011: The Sixth International Conference on Systems and Networks Communications(2011)
  11. Song H., Biming T., Mingxing H. and Elizabeth C., Efficient Threshold Self-Healing Key Distribution with Sponsorization for Infrastructure less Wireless Networks, IEEE Transactions on Wireless Communication, 8(4), 1876-1887 (2009)
  12. Dr. Padmavathi G. and Shanmugapriya D., A Survey of Attacks-Security Mechanisms and Challenges in Wireless Sensor Networks, International Journal of Computer Science and Information Security, 4(1) (2009)
  13. Sasha S., Miodrag P., Vlasios T., Scott Z. and Srivastava M., On Communication Security in Wireless Ad-Hoc Sensor Networks (2002)
  14. Blundo C., D’Arco P., Santis A., and Listo M., Design of self-healing key distribution schemes, Design Codes Cryptography, 32, 15- 44 (2004)
  15. Staddon J., Miner S., Franklin M., Balfanz D., Malkin M., and Dean D., Self-healing key distribution with revocation, IEEE Symposium Security Privacy, 224-240 (2002)
  16. Dutta R. and Mukhopadhyay S., Improved self-healing key distribution with revocation in wireless sensor network, Wireless Communication Networking, 2963-2968 (2007)