A New Extensible Key Exchange Scheme For Wireless Sensor Networks

B Kalpana, N Siva Rama Krishna

Abstract


A sensor network is confident of a large number of sensor nodes Sensor nodes are small, low-cost, low-power devices that have following performance communicate on short distances sense environmental data perform limited data processing The network usually also contains “sink” node which connects it to the outside world. Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale slowly deployed and infrastructure-less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unjust, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing combination and network-wise keys.


Keywords


A sensor network is confident of a large number of sensor nodes Sensor nodes are small, low-cost, low-power devices that have following performance communicate on short distances sense environmental data perform limited data processing The network usually

References


Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh “A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks,” in IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 2, FEBRUARY 2013.

Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: asurvey,” IEEE Commun. Surv. Tuts., vol. 10, no. 1–4, pp. 6–28, 2008.

L. Eschenauer and V. D. Gligor, “A key-management scheme fordistributed sensor networks,” in Proc. 2002 ACM CCS, pp. 41–47.

H. Chan, A. Perrig, and D. Song, “Random key predistribution schemesfor sensor networks,” in IEEE SP, pp. 197–213, 2003.

W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A key managementscheme for wireless sensor networks using deployment knowledge,” inProc. 2004 IEEE INFOCOM, pp. 586–597.

C. Castelluccia and A. Spognardi, “A robust key pre-distribution protocolfor multi-phase wireless sensor networks,” in Proc. 2007 IEEESecurecom, pp. 351–360.

D. Liu and P. Ning, “Establishing pairwise keys in distributed sensorbetworks,” in Proc. 2003 ACM CCS, pp. 52–61.

Z. Yu and Y. Guan, “A robust group-based key management scheme for wireless sensor networks,” in Proc. 2005 IEEE WCNC, pp. 1915–1920.

S. Ruj, A. Nayak, and I. Stojmenovic, “Fully secure pairwise andtriple key distribution in wireless sensor networks using combinatorial designs,” in Proc. 2011 IEEE INFOCOM, pp. 326–330.

S. Zhu, S. Setia, and S. Jajodia, “Leap: efficient security mechanisms for large-scale distributed sensor networks,” in Proc. 2003 ACM CCS,pp. 62–72.

S. A. C¸ amtepe and B. Yener, “Combinatorial design of key distribution mechanisms for wireless sensor networks,” IEEE/ACM Trans. Netw.,vol. 15, pp. 346–358, 2007.

A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, “Spins: security protocols for sensor networks,” in Proc. 2001 ACM MOBICOM,pp. 189–199.

B. Maala, Y. Challal, and A. Bouabdallah, “Hero: hierarchcal keymanagement protocol for heterogeneous WSN,” in Proc. 2008 IFIPWSAN, pp. 125–136


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.