Open AccessOpen Access


Lightweight Key Management Scheme Using Fuzzy Extractor for Wireless Mobile Sensor Network

Eid Rehman1, Ibrahima Kalil Toure2, Kashif Sultan3, Muhammad Asif4, Muhammad Habib1, Najam Ul Hasan5, Oh-Young Song6,*, Aaqif Afzaal Abbasi1

1 Department of Software Engineering, Foundation University, Islamabad, 44000, Pakistan
2 Centre Informatique, Universite Gamal Abdel Nasser de, Conakry, Guinea
3 Department of Software Engineering, Bahria University Islamabad Campus, Islamabad, Pakistan
4 GDC Ahmad Karak, Higher Education Department, Khyber Pakhtunkhwa, Pakistan
5 Department of Electrical and Computer Engineering, Dhofar University, Salalah, Oman
6 Department of Software, Sejong University, Seoul, 05006, Korea

* Corresponding Author: Oh-Young Song. Email:

Computers, Materials & Continua 2022, 71(1), 1695-1712.


The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance. All such types of applications based on wireless mobile sensor network are generally using real time data, most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network. This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station. But this leads to a serious security breach and degrades the performance of any security protocol available in this domain. Most existing schemes for authentication and cluster key management for external users, exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster head. This increase communication cost and delay in such real time access information. To handle this critical issue in cluster wireless mobile sensor network, we propose a lightweight authentication and key management scheme using a fuzzy extractor. In this scheme, any external user can access data directly from the cluster head of any cluster without the involvement of the base station. The proposed scheme only uses the one-way hash functions and bitwise XOR operations, apart from the fuzzy extractor method for the user biometric verification at the login phase. The presented scheme supports scalability for an increasing number of nodes using polynomials. The proposed scheme increases the life-time of the network by decreasing the key pool size.


Cite This Article

E. Rehman, I. Kalil Toure, K. Sultan, M. Asif, M. Habib et al., "Lightweight key management scheme using fuzzy extractor for wireless mobile sensor network," Computers, Materials & Continua, vol. 71, no.1, pp. 1695–1712, 2022.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 998


  • 758


  • 0


Share Link

WeChat scan