A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential data. Accordingly, designing key management protocols that can securely distribute secret keys among sensor nodes becomes an important issue for WSNs. This paper proposes a novel key management protocol for hierarchical WSNs based on hypergraph. In the proposed protocol, a WSN is viewed as a hypergraph. That is, a sensor node is represented as a vertex and a cluster is represented as a hyperedge. Compared to previous investigations, the proposed protocol possesses the following features. (1) Scalability. No matter how many sensor nodes and how many clusters are in a WSN, the proposed protocol can use constant communication rounds to establish all cluster keys. Therefore, it is especially suitable for resource-constrained large-scale WSNs. (2) Applicability. In the proposed protocol, all sensor nodes can be deployed randomly and establish cluster keys without knowing the topology of the whole network in advance. (3) Flexibility. This paper also presents dynamic insert and remove protocols. The dynamic insert protocol allows newly deployed sensor nodes to join an existing WSN while the dynamic remove protocol can delete compromised sensor nodes from a WSN. (4) Robustness. The proposed protocol can resist node capture attacks, node cloning attacks, wormhole attacks and energy consumption attacks.
Authors and Affiliations
Pawan Kumar Goel , Vinit Kumar Sharma
INTERIOR DECORATION USING AUGMENTED REALITY WITH COLOR PERCEPTION
The hands of Augmented Reality has been widened in all the fields by using it we can able to merge the virtual world objects with the real world environment in the android platform. By using this application we can able...
Security Issues In Mobile Cloud Computing
Mobile Cloud Computing (MCC) is a revolution in the field of mobile world. This paper presents the concept of mobile cloud computing which is a current gist in the field of computer. Beside this it acquaint with a new te...
Implementing secure data accumulation by ant agents in wireless sensor network using randomized dispersive routes
In this paper we discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP( Non Repeti...
A NEW VLSI ARCHITECTURE OF PARALLEL MULTIPLIER BASED ON RADIX-4 MODIFIED BOOTH ALGORITHM USING VHDL
Low power consumption and smaller area are some of the most important criteria for the fabrication of DSP systems and high performance systems. Optimizing the speed and area of the multiplier is a major design issue. How...
An Inclusive Framework of Mobile Commerce
The increase of the sustainability and power of wireless deals presents a proper opportunity for rising up services to customers. The main objective of this paper is to develop a systematic literature review for the disc...