Certificate less Effective Key Management Protocol For Secure Communications

K.Sandhya Vineela, S. Jyothirmayee

Abstract


To improve the current certificate less-effective key management (CL-EKM) convention for secure correspondence in element WSNs with Energy Efficient System. This numerical model will be used to evaluate the correct worth for the Thold and Tback off parameters in view of the speed and the coveted trade off between the vitality utilization and the security level. As a vital piece of mechanical application (IA), the wireless sensor network (WSN) has been a dynamic exploration territory in the course of recent years. Because of the constrained energy and correspondence capacity of sensor nodes, it appears to be particularly essential to outline a directing convention for WSNs so that detecting information can be transmitted to the recipient effectively. A energy-balanced routing technique taking into account forward-mindful element is proposed in this paper with effective key management procedures in it. In this framework, the next-hop node is chosen by attention to connection weight and forward energy density. Besides, an unconstrained remaking mechanism for nearby topology is outlined furthermore. In the tests comes about demonstrate that our framework adjusts the energy utilization, drags out the capacity lifetime and ensures high QoS of WSN.


References


H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. IEEE Symp. SP, May 2003, pp. 197–213.

W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A key predistribution scheme for sensor networks using deployment knowledge,” IEEE Trans.Dependable Secure Comput., vol. 3, no. 1, pp. 62–77, Jan./Mar. 2006.

W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005.

M. Rahman and K. El-Khatib, “Private key agreement and secure communication for heterogeneous sensor networks,” J. Parallel Distrib.Comput., vol. 70, no. 8, pp. 858–870, 2010.

M. R. Alagheband and M. R. Aref, “Dynamic and secure key management model for hierarchical heterogeneous sensor networks,” IET Inf.Secur., vol. 6, no. 4, pp. 271–280, Dec. 2012.

D. S. Sanchez and H. Baldus, “A deterministic pairwise key predistribution scheme for mobile sensor networks,” in Proc. 1st Int. Conf.SecureComm, Sep. 2005, pp. 277–288.

I.-H. Chuang, W.-T. Su, C.-Y. Wu, J.-P. Hsu, and Y.-H. Kuo, “Twolayered dynamic key management in mobile and long-lived clusterbased wireless sensor networks,” in Proc. IEEE WCNC, Mar. 2007, pp. 4145–4150.

S. Agrawal, R. Roman, M. L. Das, A. Mathuria, and J. Lopez, “A novel key update protocol in mobile sensor networks,” in Proc. 8th Int. Conf.ICISS, vol. 7671. 2012, pp. 194–207.

S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito, “An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks,” in Proc. 6th Int. Conf. CRiSIS, Sep. 2011, pp. 1–8.

X. Zhang, J. He, and Q. Wei, “EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks,” EURASIPJ. Wireless Commun. Netw., vol. 2011, pp. 1–11, Jan. 2011.

N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proc. 6th Int.Workshop Cryptograph. Hardw. Embedded Syst., 2004, pp. 119–132.

S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Proc. 9th Int. Conf. ASIACRYPT, vol. 2894. 2013, pp. 452–473.

S. Seo and E. Bertino, “Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing,” CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR 2013-10, 2013. [Online]. Available: https://www.cerias.purdue.edu/apps/reports_and_papers/.Seung-Hyun

S. H. Seo, J. Won, and E. Bertino, “POSTER: A pairing-free certificateless hybrid sign cryption scheme for advanced metering infrastructures,” in Proc. 4th ACM CODASPY, 2014, pp. 143–146.

Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, “Fast authenticated key establishment protocols for self-organizing sensor networks,” in Proc. 2nd ACM Int. Conf. WSNA, 2003, pp. 141–150.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.