KURCS: Key Updating for Removing & replacement ofCompromised Sensor Nodes from Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract : An energy efficient key management scheme is an important aspect to ensure secure services inresource constrained Wireless Sensor Networks (WSNs). There are two parts of key management scheme, i.e.key distribution and key revocation. Key distribution is the task to manage the key in such a way that if two ormore sensors want to communicate with each other for the purpose of sharing the data or control messages, thekey is to be made available to them only. The scheme should be energy efficient, as the sensor nodes in thenetwork are resource constrained. However, Key revocation is the task of removing the compromised sensorsfrom the network to restrict such nodes to participate in further communications to avoid any kind of interference or disturbance in communication process. In this paper, we first review and summarize the currentkey revocation schemes. Then, we present an energy efficient key revocation scheme for removing compromisedsensor nodes from the networks. Unlike most key removal schemes focus on removing the compromised nodefrom the network for this purpose these schemes redistribute the keys or keying material to each and every node in the network. But the proposed scheme, Key Updating for Removing & replacement of Compromised Sensornodes from Wireless Sensor Networks (KURCS), uses key updating techniques to update the keys of few sensorsthat are uncompromised not in the entire networks thus removes compromised sensor from the network.Simulation result proves that the proposed scheme is energy efficient and performs better than othercomparable schemes in the literature without increasing the communication overheads.
Authors and Affiliations
Rohit Vaid , Vijay Kumar
A Dynamic Image Generation Scheme for Steganographic Data Encryption
Abstract: This paper proposes a new approach to provide an extra layer of security to steganographictechniques. Today, most of the data is sent over the internet, whether personal or professional. Protection of dig...
Improving Web Image Search Re-ranking
Nowadays, web-scale image search engines (e.g. Google Image Search, Microsoft Live Image Search) rely almost purely on surrounding text features. This leads to the ambiguous and noisy results. We propose an...
Automatic test data generation for time-continuous embedded system using built-in signals
Nowadays, embedded systems are becoming critical applications and play important roles in modern society. Therefore, quality assurance for these types of systems has attracted many attentions in software engineering rese...
Green Computing Under Cloud Environment Proposed architecture using cloud computing & thin client
Private Cloud computing provides attractive & cost efficient Server Based Computing (SBC). The implementation of Thin client computing for private cloud computing will reduce the IT Cost and consumes less pow...
Model Based Software Timing Analysis Using Sequence Diagramfor Commercial Applications
Abstract: The verification of running time of a program is necessary in designing a system with real lifeconstrain. Verification defines lower and upper bounds which reflects control flow that depends on data as we...