Evaluate the Key Management of Identity-Based Digital Signature To Routing In Cluster-Based Wireless Sensor Networks

Chiranjeevi Asu, Sudhir Varma Sagiraju

Abstract


Cluster-based information transmission in WSNs has been analyzed by scientists keeping in mind the end goal to accomplish the system scalability and administration, which capitalize on hub life and diminish transfer speed use by utilizing nearby coordinated effort as a part of the center of sensor nodes. We suggest two ensured and clever information Transmission (SET) conventions for CWSNs, called SET-IBS and SETIBOOS, by method for the IBS plan and the IBOOS plan, correspondingly. The key proposal of both SET-IBS and SET-IBOOS is to affirm the encrypted detected information, by be legitimate computerized marks to message parcels, which are able in correspondence and applying the key supervision for security.


References


T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor NetworkTechnologies for the Information Explosion Era, Stud. Comput. Intell.Springer-Verlag, 2010, vol. 278.

Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issuesin Wireless Sensor Networks,” IEEE Commun. Surveys Tuts., vol. 8,no. 2, pp. 2–23, 2006.

A. A. Abbasi and M. Younis, “A survey on clustering algorithms forwireless sensor networks,” Comput. Commun., vol. 30, no. 14-15, pp.2826–2841, 2007.

W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “AnApplication-Specific Protocol Architecture for Wireless MicrosensorNetworks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670,2002.

A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An Analytical Modelfor Information Retrieval in Wireless Sensor Networks Using EnhancedAPTEEN Protocol,” IEEE Trans. Parallel Distrib. Syst., vol. 13, pp.1290–1302, 2002.

S. Yi, J. Heo, Y. Cho et al., “PEACH: Power-efficient and adaptiveclustering hierarchy protocol for wireless sensor networks,” Comput.Commun., vol. 30, no. 14-15, pp. 2842–2852, 2007.

K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and ImplementationIssues of Clustering in Wireless Sensor Networks,” Int. J. Comput.Applications, vol. 47, no. 11, pp. 23–28, 2012.

L. B. Oliveira, A. Ferreira, M. A. Vilac¸aet al., “SecLEACH-On thesecurity of clustered sensor networks,” Signal Process., vol. 87, pp.2882–2895, 2007.

P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performanceanalysis of a secure clustering protocol for sensor networks,” in Proc.IEEE NCA, 2007, pp. 145–152.

K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol forCluster-Based Wireless Sensor Networks Using Group Key Management,”in Proc. WiCOM, 2008, pp. 1–5.

S. Sharma and S. K. Jena, “A Survey on Secure Hierarchical RoutingProtocols in Wireless Sensor Networks,” in Proc. ICCCS, 2011, pp.146–151.

G. Gaubatz, J. P. Kaps, E. Ozturket al., “State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks,”in Proc. IEEE PerCom Workshops, 2005, pp. 146–150.

W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEETrans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976.

A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” inLect. Notes. Comput. Sc. - CRYPTO, 1985, vol. 196, pp. 47–53.

D. W. Carman, “New Directions in Sensor Network Key


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.