Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are mainly used to record sensitive information regarding physical or environmental conditions. As they collect sensitive information, secure and accurate transmission of data is important. For secure transmission of data, key management is a corner stone in wireless sensor networks. Wireless sensor networks are infrastructure less. Due to this reason, key distribution among increasing number of nodes by third parties is a challenging problem. Hence, symmetric key pre-distribution algorithms areintroduced for key distribution. However, most schemes suffer from low scalability, high storage overhead and it is difficult to implement security with existing solutions. In order to provide good key sharing and secure connectivity, an asymmetric algorithm called elliptical curve cryptography (ECC) will be used. After collecting data from deployed environment, sensor nodes will send data to sink node, which receives data and process the information. Data will be routed to sink node in secure environment using shortest path routers. The schemes will be implemented in java programming language and results would be derived to show/compared for more efficiency in terms of secure connectivity, storage overhead, computational cost and communication cost.
Authors and Affiliations
D. S. S. L. Sruthi , D. Sesha Manoj, I. Ravi Prakash Reddy
Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
Abstract: This paper presents an algorithm for bandwidth management in integrated LTE network and WLAN. The proposed algorithm also suitable for multimedia network (image, telephone and videophone). A software tool is im...
The Approaches to Amalgamate the Anti-Network Attacks Technologies in Intrusion Detection and Prevention Systems
Abstract: A Network Intrusion Detection Prevention System (IDPS) is a mechanism that continuously monitors the network traffic and finds out the malicious, suspicious and undesired network activities. After ide...
Energy-Balanced Dispatch of Mobile Sensors in Hybrid Wireless Sensor Network with Obstacles
We consider a hybrid wireless sensor network with static and mobile nodes. Static sensors monitor the environment and report events occurring in the sensing field. Mobile sensors are then dispatched to visit these even...
Cloud Computing: A Key to It Development in West African Sub Region
Abstract: There is no gainsaying the fact that information technology (IT) development in West Africa has met a lot of challenges ranging from cyber threat to inadequate IT infrastructure. Cloud computing is a revo...
An Efficient Method for Noisy Annotation Data Modeling
Abstract : Probabilistic topic models are used for analyzing and extracting content-related annotations from noisy annotated discrete data like WebPages on WWW and these WebPages are stored using social bookmarking servi...