Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10
Abstract
Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. WSN’s are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in Wireless Sensor Networks, it is important to encrypt messages sent among sensor nodes. In this paper, we propose a scheme called Modified Bloom’s Scheme (MBS) that uses asymmetric matrices of keys in place of symmetric matrices in order to establish secret keys between node pairs.The network resilience against node capture attack is improved using the proposed scheme.
Authors and Affiliations
Shaila K , S H Manjula , Thriveni J , Venugopal K R , L M Patnaik
SIMULATION BASED DESIGN OF RETENTION TANK OF MODULAR CONTROLLER DISCHARGE SYSTEM (MCDS) FOR TRAIN COACHES
As increasingly more complex embedded systems are being considered for design, their design and validation is proving a Herculean task. Innovative applications demand stringent requirements, necessitating improvements in...
Index Structure for the Multi-scale Representation of Multi-dimensional Spatial Data in WebGIS
To solve the problem that existing data structure cannot support the multi-scale representation of multi-dimensional spatial data in Web eographic Information System (WebGIS), a modified data structure has been put forw...
Design and Development of Wireless Sensor Node
This paper presents design and development of intelligent sensor node for environmental monitoring. The node is equipped with multimode sensors for sensing different environmental parameters, the node can sense four diff...
Optimizing Dependencies - A solution to Failure Proneness of software
With the emerging technologies, large complex software isbeing built in terms of modules. Although the term ‘module’ is introduced to reduce the complexity in maintenance, but the dependencies among the modules is causin...
Classification of Incomplete Data Handling Techniques – An Overview
The task of classification with incomplete data is a complex phenomena and its performance depends upon the method selected for handling the missing data. Missing data occur in datasets when no data value is stored for a...