Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10

Abstract

Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. WSN’s are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in Wireless Sensor Networks, it is important to encrypt messages sent among sensor nodes. In this paper, we propose a scheme called Modified Bloom’s Scheme (MBS) that uses asymmetric matrices of keys in place of symmetric matrices in order to establish secret keys between node pairs.The network resilience against node capture attack is improved using the proposed scheme.

Authors and Affiliations

Shaila K , S H Manjula , Thriveni J , Venugopal K R , L M Patnaik

Keywords

Related Articles

A QOS AWARE QUANTITATIVE WEB SERVICE SELECTION MODEL

Web service is a core technology for sharing information resources and integrating processes in companies or organizations. As the number of applications connected by Web service is increased, the importance of Web servi...

A Review on sensor based communication kit for impaired society

A gesture is used to classify and recognize a signal that enables communication among the impaired community. It is a technique that has been in use to make people feel comfortable just like the normal people behave. In...

Correlating Dimensions of Inheritance Hierarchy with Complexity & Reuse

Inheritance is the vital feature of any object oriented software which provides reuse of exiting classes for designing new classes. Higher reuse provides higher productivity and greater quality. Inheritance hierarchy is...

Co-Recursively Enumerable Triods with Computable Endpoints

Recursive sets in the Euclidean space are those sets which an be effectively approximated by finitely many points for an arbitrary given precision. On the other hand, co-recursively enumerable sets are those sets whose...

Direct Processor Access for Non Dedicated Server using Multi Core Processor

The objective of the paper is to design a co processor for a desktop machine which enables the machine to act as non dedicated server, such that the co processor will act as a server processor and the multi-core processo...

Download PDF file
  • EP ID EP140018
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Shaila K, S H Manjula, Thriveni J, Venugopal K R, L M Patnaik (2011). Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks. International Journal on Computer Science and Engineering, 3(10), 3490-3501. https://europub.co.uk/articles/-A-140018