Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are mainly used to record sensitive information regarding physical or environmental conditions. As they collect sensitive information, secure and accurate transmission of data is important. For secure transmission of data, key management is a corner stone in wireless sensor networks. Wireless sensor networks are infrastructure less. Due to this reason, key distribution among increasing number of nodes by third parties is a challenging problem. Hence, symmetric key pre-distribution algorithms areintroduced for key distribution. However, most schemes suffer from low scalability, high storage overhead and it is difficult to implement security with existing solutions. In order to provide good key sharing and secure connectivity, an asymmetric algorithm called elliptical curve cryptography (ECC) will be used. After collecting data from deployed environment, sensor nodes will send data to sink node, which receives data and process the information. Data will be routed to sink node in secure environment using shortest path routers. The schemes will be implemented in java programming language and results would be derived to show/compared for more efficiency in terms of secure connectivity, storage overhead, computational cost and communication cost.

Authors and Affiliations

D. S. S. L. Sruthi , D. Sesha Manoj, I. Ravi Prakash Reddy

Keywords

Related Articles

 A Smart and Wearable Cardiac Healthcare System with Monitoring of Sudden Fall for Elderly and Post-Operative Patients

Abstract: The dominance of chronic diseases, driven by an increasingly aging population with a new health paradigm that emphasizes early finding, early diagnosis and early treatment, is highly recommended. Especially, Ca...

Approach Of Object Oriented Data Modeling

In This section explains some basic concepts such as Object-oriented programming, objects, database system, and object-oriented database. Also there is some explanations of the basic object-oriented modeling .

 Text Clustering in Distributed Networks with Enhanced File Security

 Abstract: Text Clustering technique is widely used in both centralized and distributed environments for information retrieval. Centralized approaches are used in traditional text clustering algorithms. In such appr...

 lntrusion Detection System Using GA

 Abstract: Intrusion detection has become an essential component of computer security in recent years so many technologies have been developed to protect our system or network from intruders such as antivirus, firew...

 Renal Calculi Detection in Ultrasound images and Diagnosis of Images using Image Segmentation

 Abstract: Now-a-days Renal Calculi is becoming a most common disease in both men and women. Calculi are due to abnormal collection of certain chemicals like oxalate, phosphate and uric acid. These calculi can be pr...

Download PDF file
  • EP ID EP164772
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

D. S. S. L. Sruthi, D. Sesha Manoj, I. Ravi Prakash Reddy (2016). Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 23-33. https://europub.co.uk/articles/-A-164772