An Efficient Polynomial Pool-Based Scheme for Distributed Heterogeneous Wireless Sensor Networks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 6
Abstract
The Sinks are vivacious in many wireless sensor network (WSN) solicitations for competent data accumulation, confined sensor reprogramming, and for extricating and revoking conceded sensors. However, in sensor networks that make use of the temporal key dissemination schemes for pairwise key naissance and endorsement between sensor nodes and mobile sinks, the engross of mobile sinks for data assortment exalts a new reassurance challenge: in the basic probabilistic and q-composite key redistribution schemes, a mugger can easily procure a hefty number of keys by apprehending a small fraction of nodes, and hence, can gain control of the network by arraying a simulated mobile sink preloaded with some conceded keys. This critique designates a multifarious level general framework that authorities the use of any pair wise key redistribution scheme as its basic component. The new framework necessitates two separate key pools, one for the mobile sink to retrieve the network, and one for pair wise key disposition between the sensors. To auxiliary condense the reimbursements initiated by predetermined access node replication attacks; we have underwired the authentication mechanism between the sensor and the stationary access node in the propositioned framework. Through detailed analysis, we show that our security framework has sophisticated network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme.
Authors and Affiliations
M. Kumar
An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggregate Concrete
Shear strength is a property of major significance for wide range of civil engineering materials and structures. Shear and punching shear failures particularly in deep beams in corbels and in concrete flat slab...
Heuristic Approach for Secure Energy Efficient Routing in Mobile ad hoc Network
In today’s scenario, energy savings and security is the major problem in all kind of the networks. MANET is a network, which is very popular due to its unique characteristics from all the other types of networks. M...
Secure File Sharing In Cloud Using Encryption with Digital Signature
This paper we discuss about the data sharing in a cloud with multiple owner by generating keys and digital signature. The proposed methodology suggests the encryption of the files to be uploaded on the cloud. T...
Comparative Study for MCDS and DSR Which Are Used For Packet Forwarding In Ad Hoc Network
Abstract: this paper provides a brief overview of the operation of the DSR protocol; providing only enough detail that the reader can understand the analysis of DSR And comparative study of MCDS and DSR which is us...
Study & Testing Of Bio-Composite Material Based On Munja Fibre
The incorporation of natural fibres such as munja fiber composites has gained increasing applications both in many areas of Engineering and Technology. The aim of this study is to evaluate mechanical properties...