Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are mainly used to record sensitive information regarding physical or environmental conditions. As they collect sensitive information, secure and accurate transmission of data is important. For secure transmission of data, key management is a corner stone in wireless sensor networks. Wireless sensor networks are infrastructure less. Due to this reason, key distribution among increasing number of nodes by third parties is a challenging problem. Hence, symmetric key pre-distribution algorithms areintroduced for key distribution. However, most schemes suffer from low scalability, high storage overhead and it is difficult to implement security with existing solutions. In order to provide good key sharing and secure connectivity, an asymmetric algorithm called elliptical curve cryptography (ECC) will be used. After collecting data from deployed environment, sensor nodes will send data to sink node, which receives data and process the information. Data will be routed to sink node in secure environment using shortest path routers. The schemes will be implemented in java programming language and results would be derived to show/compared for more efficiency in terms of secure connectivity, storage overhead, computational cost and communication cost.

Authors and Affiliations

D. S. S. L. Sruthi , D. Sesha Manoj, I. Ravi Prakash Reddy

Keywords

Related Articles

 Security Enforcement with query routing Information Brokering in Distributed Information Sharing

Abstract: Information brokering system (IBS) shares information via on-demand access. IBS connect large-scale loosely federated data sources via a brokering overlay. It is a peer-to-peer overlay network that comprises di...

An Analytical Study of Genetic Algorithm for Generating Frequent Itemset and Framing Association Rules At Various Support Levels

Abstract: In customary, frequent itemsets are propogated from large data sets by employing association rule mining algorithms like Apriori, Partition, Pincer-Search, Incremental and Border algorithm etc., which gains ino...

 Implementation of Various Cryptosystem Using Chaos

 Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic a...

 SQL Injection Prevention by Adaptive Algorithm

 Abstract: An SQL Injection is one of the most dangerous security issues. SQL injections are dangerous becausethey are a door wide open to hackers to enter your system through your Web interface and to do whatever t...

 Mapping and Analysis of Crime in Aurangabad City using GIS

Abstract: The study of Earth and its features with the help of Remote Sensing has lead to a fast growing and effective technology called Geographic Information System (GIS) where digital Maps and spatial data can be used...

Download PDF file
  • EP ID EP164772
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

D. S. S. L. Sruthi, D. Sesha Manoj, I. Ravi Prakash Reddy (2016). Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 23-33. https://europub.co.uk/articles/-A-164772