Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10
Abstract
Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. WSN’s are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in Wireless Sensor Networks, it is important to encrypt messages sent among sensor nodes. In this paper, we propose a scheme called Modified Bloom’s Scheme (MBS) that uses asymmetric matrices of keys in place of symmetric matrices in order to establish secret keys between node pairs.The network resilience against node capture attack is improved using the proposed scheme.
Authors and Affiliations
Shaila K , S H Manjula , Thriveni J , Venugopal K R , L M Patnaik
Comparison of Optimal Homotopy Asymptotic Method with Homotopy Perturbation Method of Twelfth Order Boundary Value Problems
In this work, we consider special problem consisting of twelfth order two-point boundary value by using the Optimal Homotopy Asymptotic Method and Homotopy Perturbation Method. Now, we discuss the comparison in between O...
Nodes distribution and selection of accurate mobility Framework to systematically analyze its impact for improving performance of routing protocols for mobile ad hoc networks through Simulations
Research on mobile ad hoc routing protocols performance based on simulation relies on choice of realistic mobility model. However, in the absence of realistic data movement, Synthetic models may be used for generating mo...
MEASURING THE QUALITY OF OBJECT ORIENTED SOFTWARE MODULARIZATION DEFINING METRICS AND ALGORITHM
We proposed a System to measure the quality of modularization of object-oriented software system. Our work is proposed in three Parts as follows: MODULE 1: DEFINING METRICS FOR OBJECT ORIENTED SOFTWARE AND ALGORITHM M...
SEGMENTATION OF OIL SPILL IMAGES USING IMPROVED FCM AND LEVEL SET METHODS.
The main part of image processing and computer vision is Image segmentation. Image segmentation is the task of splitting a digital image into one or more regions of interest. In this paper a robust method for oil spill S...
A Effective and Complete Preprocessing for Web Usage Mining
Now, peoples are interested in analyzing log files which can offer valuable insight into web site usage. The log files hows actual usage of web site under all circumstances and don’t need to conduct external experimenta...