Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are mainly used to record sensitive information regarding physical or environmental conditions. As they collect sensitive information, secure and accurate transmission of data is important. For secure transmission of data, key management is a corner stone in wireless sensor networks. Wireless sensor networks are infrastructure less. Due to this reason, key distribution among increasing number of nodes by third parties is a challenging problem. Hence, symmetric key pre-distribution algorithms areintroduced for key distribution. However, most schemes suffer from low scalability, high storage overhead and it is difficult to implement security with existing solutions. In order to provide good key sharing and secure connectivity, an asymmetric algorithm called elliptical curve cryptography (ECC) will be used. After collecting data from deployed environment, sensor nodes will send data to sink node, which receives data and process the information. Data will be routed to sink node in secure environment using shortest path routers. The schemes will be implemented in java programming language and results would be derived to show/compared for more efficiency in terms of secure connectivity, storage overhead, computational cost and communication cost.

Authors and Affiliations

D. S. S. L. Sruthi , D. Sesha Manoj, I. Ravi Prakash Reddy

Keywords

Related Articles

 Pervasive Computing Applications And Its Security Issues &Challenges

 Abstract: This paper discusses the emerging field of pervasive computing applications and its securitychallenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,anywhere...

 A Review on Speckle Noise Reduction Techniques

 Abstract:In medical image processing, Image denoising plays a very important role in diagnosis. Medical images are very much inconsistent. In medical imaging, Ultrasound is very popular due to its low cost, least h...

 Communication via LED

 Abstract: This paper describes the use of light as a medium for communication between two systems. It takes out the “optics from the optical fiber”. It demonstrates transmission and reception of live data between t...

 A Review of FPGA-based design methodologies for efficient hardware Area estimation

 In recent years, FPGA’s have become increasingly important and have found their way into system design. So, the desire emerges for a means that allows early area and performance estimation Understanding how a...

 Cosine Similarity Based Clustering For Software Testing Using Prioritization

 prioritizing the test cases helps to increase the rate of fault detection. The difficulty of ensuring the dependability in the growth of the scale of software and software testing in distributed environment a suf...

Download PDF file
  • EP ID EP164772
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

D. S. S. L. Sruthi, D. Sesha Manoj, I. Ravi Prakash Reddy (2016). Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 23-33. https://europub.co.uk/articles/-A-164772