A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential data. Accordingly, designing key management protocols that can securely distribute secret keys among sensor nodes becomes an important issue for WSNs. This paper proposes a novel key management protocol for hierarchical WSNs based on hypergraph. In the proposed protocol, a WSN is viewed as a hypergraph. That is, a sensor node is represented as a vertex and a cluster is represented as a hyperedge. Compared to previous investigations, the proposed protocol possesses the following features. (1) Scalability. No matter how many sensor nodes and how many clusters are in a WSN, the proposed protocol can use constant communication rounds to establish all cluster keys. Therefore, it is especially suitable for resource-constrained large-scale WSNs. (2) Applicability. In the proposed protocol, all sensor nodes can be deployed randomly and establish cluster keys without knowing the topology of the whole network in advance. (3) Flexibility. This paper also presents dynamic insert and remove protocols. The dynamic insert protocol allows newly deployed sensor nodes to join an existing WSN while the dynamic remove protocol can delete compromised sensor nodes from a WSN. (4) Robustness. The proposed protocol can resist node capture attacks, node cloning attacks, wormhole attacks and energy consumption attacks.
Authors and Affiliations
Pawan Kumar Goel , Vinit Kumar Sharma
Named Entity Recognition in Indian Languages Using Gazetteer Method and Hidden Markov Model: A Hybrid Approach
Named Entity Recognition (NER) is the task of processing text to identify and classify names, which is an important component in many Natural Language Processing (NLP) applications, enabling the extraction of useful info...
Apriori algorithm on Marine Fisheries Biological Data
Data Mining (DM) is the process of analysing data from different vista and gives summary on specific determination. Association rules are rules describing the associations or correlations to bring out the hidden pattern...
TUMOR VOLUME CALCULATION OF BRAIN FROM MRI SLICES
The main objective of this paper is to calculate volumes of brain tumors from sagittal, axial and coronal orientations. Brain tumor detection is a most important area in medical image processing. Brain cancer is a diseas...
An approach of curing Depression by Artificial Neural Networks(ANN) Approach with 5 Input Node Reviewing 3 Input Node
Psychologists have various medical ways to treat depression using counseling, medicines and much more. These ways do not guarantee that depression is totally cured. Depression affects the neurons in brain, decreasing the...
An Approach to Minimize Computational and Communicational Overhead in Cloud Computing
Cloud computing has been envisioned as the next generation information technology architecture for enterprises. Cloud Computing moves the data on the cloud storage servers maintained by service providers, which deprive t...