Back to Current Issues

Effective Key Management In Dynamic Wireless Sensor Networks

Uma Vasala , Dr. G. R. Sakthidharan ,

Affiliations
M.Tech [CSE],Gokaraju Rangaraju Institute of Engineering and Technology
:10.22362/ijcert/2017/v4/i7/xxxx [UNDER PROCESS]


Abstract
Recently, wireless detector networks (WSNs) have been deployed for a good form of applications, including military sensing, and pursuit, patient standing watching, traffic flow watching, wherever sensory devices typically move between different locations. Securing knowledge and communications need suitable encoding key protocols. In this paper, we tend to propose a certificate less efficient key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports economic key updates once a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol conjointly supports economic key revocation for compromised nodes and minimizes the impact of a node compromise on the protection of alternative communication links. A security analysis of our theme shows that our protocol is effective in defensive against separate attacks. We implement CL-EKMin Contiki OS and simulate it mistreatment Cooja machine to assess its time, energy, communication, and memory performance.


Citation
Uma Vasala , Dr. G. R. Sakthidharan . (2017).Effective Key Management In Dynamic Wireless Sensor Networks . International Journal of Computer Engineering In Research Trends , 4(7), 308-312. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I7005.pdf


Keywords : Wireless sensor networks, certificate less public key cryptography, key management scheme.

References
[1] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. IEEE Symp. SP, May 2003, pp. 197–213.
[2] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A key predistribution scheme for sensor networks using deployment knowledge,” IEEE Trans. Dependable Secure Comput., vol. 3, no. 1, pp. 62–77, Jan./Mar. 2006.
[3] W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005.
[4] M. Rahman and K. El-Khatib, “Private key agreement and secure communication for heterogeneous sensor networks,” J. Parallel Distrib. Comput., vol. 70, no. 8, pp. 858–870, 2010.
[5] M. R. Alagheband and M. R. Aref, “Dynamic and secure key management model for hierarchical heterogeneous sensor networks,” IET Inf. Secur., vol. 6, no. 4, pp. 271–280, Dec. 2012.
[6] D. S. Sanchez and H. Baldus, “A deterministic pairwise key predistribution scheme for mobile sensor networks,” in Proc. 1st Int. Conf. SecureComm, Sep. 2005, pp. 277–288.
[7] I.-H. Chuang, W.-T. Su, C.-Y. Wu, J.-P. Hsu, and Y.-H. Kuo, “Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks,” in Proc. IEEE WCNC, Mar. 2007, pp. 4145–4150.
[8] S. Agrawal, R. Roman, M. L. Das, A. Mathuria, and J. Lopez, “A novel key update protocol in mobile sensor networks,” in Proc. 8th Int. Conf. ICISS, vol. 7671. 2012, pp. 194–207.
[9] S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito, “An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks,” in Proc. 6th Int. Conf. CRiSIS, Sep. 2011, pp. 1–8.
[10] X. Zhang, J. He, and Q. Wei, “EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks,” EURASIP J. Wireless Commun. Netw., vol. 2011, pp. 1–11, Jan. 2011.
[11] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proc. 6th Int. Workshop Cryptograph. Hardw. Embedded Syst., 2004, pp. 119–132.
[12] S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Proc. 9th Int. Conf. ASIACRYPT, vol. 2894. 2013, pp. 452–473.
[13] S. Seo and E. Bertino, “Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing,” CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR 2013-10, 2013. [Online]. Available: https://www.cerias.purdue.edu/apps/reports_and_papers/.Seung-Hyun
[14] S. H. Seo, J. Won, and E. Bertino, “POSTER: A pairing-free certificateless hybrid sign cryption scheme for advanced metering infrastructures,” in Proc. 4th ACM CODASPY, 2014, pp. 143–146.
[15] Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, “Fast authenticated key establishment protocols for self-organizing sensor networks,” in Proc. 2nd ACM Int. Conf. WSNA, 2003, pp. 141–150.
[16] J.David Sukeerthi Kumar,” Investigation on Secondary Memory Management in Wireless Sensor Network,” International Journal of Computer Engineering In Research Trends.,vol .2,no.6,pp.387-391,June 2015.
[17] Kuruva Laxmanna, N.Poorna Chandra Rao, Dr.S.Prem Kumar,” Moderating vampire attacks in Wireless Sensor Network,” International Journal of Computer Engineering In Research Trends.,vol.1,no.3,pp.143-151,September 2014.
[18].P.G.V.SureshKumar,Seelam Sowjanya,”Developing an Enterpriseenvironment By Using Wireless Sensor Network System Architecture,” International Journal of Computer Engineering In Research Trends.,vol .2,no.10,pp.902-908,October 2015.
[19] Dr. C. Gulzar,AmeenaYasmeen," Maximum network lifetime with load balance and connectivity by clustering process for wireless sensor networks,”International Journal of Computer Engineering In Research Trends.,vol.3,no.7,pp.375-383,July 2016.
[20] A.Yogananda ,Chepuri Sai Teja ," A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments, ” International Journal of Computer Engineering In Research Trends.,vol.3,no.8,pp.436-440,August 2016. 



DOI Link : Not yet assigned

Download :
  V4I7005.pdf


Refbacks : There are currently no refbacks

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30



Submit your paper to editorijcert@gmail.com

>