Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10
Abstract
Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. WSN’s are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in Wireless Sensor Networks, it is important to encrypt messages sent among sensor nodes. In this paper, we propose a scheme called Modified Bloom’s Scheme (MBS) that uses asymmetric matrices of keys in place of symmetric matrices in order to establish secret keys between node pairs.The network resilience against node capture attack is improved using the proposed scheme.
Authors and Affiliations
Shaila K , S H Manjula , Thriveni J , Venugopal K R , L M Patnaik
Relation based Ontology Matching using Alignment Strategies
The set of relation within a knowledge domain will be expressed with a help of Ontology, but data within the knowledge domain get scattered all over its space. To get a most precise result there must be necessary to rela...
Efficient Block Truncation Coding
Block Truncation Coding (BTC) is one of the lossy image ompression techniques. The computational complexity involved in this method is very simple. In the proposed method, the feature of inter-pixel correlation is explo...
Collaborative Filtering Based Recommendation System: A survey
the most common technique used for recommendations is collaborative filtering. Recommender systems based on collaborative filtering predict user preferences for products or services by learning past user-item relationshi...
Cost Effective Cloud Environment Setup to Secure Corporate Data
In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major Cloud computing firms have began to integrate frameworks for parallel pr...
A New Encryption Method for Secure Transmission of Images
In this paper, a novel approach is designed for transmitting images securely using a technique called Gödelization followed by the public key encryption. The image which is to be transmitted is transformed into a sequenc...