A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential data. Accordingly, designing key management protocols that can securely distribute secret keys among sensor nodes becomes an important issue for WSNs. This paper proposes a novel key management protocol for hierarchical WSNs based on hypergraph. In the proposed protocol, a WSN is viewed as a hypergraph. That is, a sensor node is represented as a vertex and a cluster is represented as a hyperedge. Compared to previous investigations, the proposed protocol possesses the following features. (1) Scalability. No matter how many sensor nodes and how many clusters are in a WSN, the proposed protocol can use constant communication rounds to establish all cluster keys. Therefore, it is especially suitable for resource-constrained large-scale WSNs. (2) Applicability. In the proposed protocol, all sensor nodes can be deployed randomly and establish cluster keys without knowing the topology of the whole network in advance. (3) Flexibility. This paper also presents dynamic insert and remove protocols. The dynamic insert protocol allows newly deployed sensor nodes to join an existing WSN while the dynamic remove protocol can delete compromised sensor nodes from a WSN. (4) Robustness. The proposed protocol can resist node capture attacks, node cloning attacks, wormhole attacks and energy consumption attacks.
Authors and Affiliations
Pawan Kumar Goel , Vinit Kumar Sharma
Comparative Study of Reactive/On Demand Routing Protocols for Mobile Adhoc Network
In an ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. There is no stationary infrastructure such as base stations. The routing protocol must be able to keep up with the high degre...
Web Content Filtering Techniques: A Survey
For many, accessing the Internet is a mixed blessing; in worst case, it can create serious problems. Web Content Filtering is a firewall to block certain sites from being accessed. Content filtering and the products that...
Research Challenges in E-Business - A Review
Electronic business refers to the use of Internet for doing business. Rush to E-Business sites attitude affects the quality of such sites in many ways. The increase of popularity of the e business sites are creating chal...
Exploration of Cloud Computing and its Essential Facets
Cloud computing is all about how we can use external services over network by various resources provided by many different companies that share and access through the internet to perform many commercial essentialities. C...
Processing of Iris Video frames to Detect Blink and Blurred frames
In Video based Iris Recognition system, Iris images are obtained with non-Cooperative situation. In video based system, it is time consuming to process each video frame for iris segmentation because some video frames may...