KURCS: Key Updating for Removing & replacement ofCompromised Sensor Nodes from Wireless Sensor Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

Abstract : An energy efficient key management scheme is an important aspect to ensure secure services inresource constrained Wireless Sensor Networks (WSNs). There are two parts of key management scheme, i.e.key distribution and key revocation. Key distribution is the task to manage the key in such a way that if two ormore sensors want to communicate with each other for the purpose of sharing the data or control messages, thekey is to be made available to them only. The scheme should be energy efficient, as the sensor nodes in thenetwork are resource constrained. However, Key revocation is the task of removing the compromised sensorsfrom the network to restrict such nodes to participate in further communications to avoid any kind of interference or disturbance in communication process. In this paper, we first review and summarize the currentkey revocation schemes. Then, we present an energy efficient key revocation scheme for removing compromisedsensor nodes from the networks. Unlike most key removal schemes focus on removing the compromised nodefrom the network for this purpose these schemes redistribute the keys or keying material to each and every node in the network. But the proposed scheme, Key Updating for Removing & replacement of Compromised Sensornodes from Wireless Sensor Networks (KURCS), uses key updating techniques to update the keys of few sensorsthat are uncompromised not in the entire networks thus removes compromised sensor from the network.Simulation result proves that the proposed scheme is energy efficient and performs better than othercomparable schemes in the literature without increasing the communication overheads.

Authors and Affiliations

Rohit Vaid , Vijay Kumar

Keywords

Related Articles

 A Dynamic Image Generation Scheme for Steganographic Data Encryption

 Abstract: This paper proposes a new approach to provide an extra layer of security to steganographictechniques. Today, most of the data is sent over the internet, whether personal or professional. Protection of dig...

 Improving Web Image Search Re-ranking

 Nowadays, web-scale image search engines (e.g. Google Image Search, Microsoft Live Image Search) rely almost purely on surrounding text features. This leads to the ambiguous and noisy results. We propose an...

Automatic test data generation for time-continuous embedded system using built-in signals

Nowadays, embedded systems are becoming critical applications and play important roles in modern society. Therefore, quality assurance for these types of systems has attracted many attentions in software engineering rese...

 Green Computing Under Cloud Environment Proposed architecture using cloud computing & thin client

 Private Cloud computing provides attractive & cost efficient Server Based Computing (SBC). The implementation of Thin client computing for private cloud computing will reduce the IT Cost and consumes less pow...

 Model Based Software Timing Analysis Using Sequence Diagramfor Commercial Applications

 Abstract: The verification of running time of a program is necessary in designing a system with real lifeconstrain. Verification defines lower and upper bounds which reflects control flow that depends on data as we...

Download PDF file
  • EP ID EP111363
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Rohit Vaid, Vijay Kumar (2015).  KURCS: Key Updating for Removing & replacement ofCompromised Sensor Nodes from Wireless Sensor Networks. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 57-67. https://europub.co.uk/articles/-A-111363