Establishing Secure Event Detection with Key Pair in Heterogeneous Wireless Sensor Network

Article Preview

Abstract:

How to improve the efficiency with security with the extension of lifetime of sensor nodes is the interesting area in the field of Heterogeneous Wireless Sensor Network (WSN). Key management is also an important concept of any secure communication. Expiring secure connections cause that connectivity in network decrease. For decreasing effect of compromising a node on expiring secure connections. The heterogeneity among sensor nodes help provides scalability, notable energy efficiency and security benefits. The previous protocol uses both probabilistic key pre-distribution in the lower tier of the network architecture and public key cryptography in the upper tier to distribute session keys. We proposed a protocol for key establishment which provides a high level of security and minimizes the resource consumption of the sensor devices. This provide a better suited for heterogeneous environment when applied with sensor devices. Finally our proposed protocol is better in comparison from others by applying different simulators.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

3445-3450

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Eschenauer, V.D. Gligor, A key management scheme for distributed sensor networks. In: Proceedings of (CCS '02. ), pp.41-47, Washington, (2002).

Google Scholar

[2] H. Chan, A. Perrig, and D. Song, Random key pre distribution schemes for sensor networks, In IEEE Symposium on Research in Security and Privacy, (2003).

Google Scholar

[3] X. Du, Y. Xiao, M. Guizani, and H. -H. Chen. An effective key management scheme for heterogeneous sensor networks, Ad Hoc Networks, 5(1): 24–34, (2007).

DOI: 10.1016/j.adhoc.2006.05.012

Google Scholar

[4] S. Hussain., F. Kausar, A. Masood, An efficient key distribution scheme for heterogeneous sensor networks. In: the international conference on wireless communications and mobile computing, pp.388-392. Hawaii(2007).

DOI: 10.1145/1280940.1281023

Google Scholar

[5] P. Gupta and P. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory IT 2000, vol. IT-46(2), p.388–404, (2000).

DOI: 10.1109/18.825799

Google Scholar

[6] X. Du, Y. Xiao, M. Guizani, H.H. Chen, An Effective Key Management Scheme for Heterogeneous Sensor Networks, Ad Hoc Networks, Elsevier, vol. 5, issue 1, 2007, p.24–34.

DOI: 10.1016/j.adhoc.2006.05.012

Google Scholar

[7] J. R. Douceur, The Sybil Attack, " in 1st International Workshop on Peer-to- Peer Systems (IPTPS , 02), March (2002).

Google Scholar

[8] Y.C. Hu, A. Perrig, and D. B. Johnson, Wormhole detection in wireless ad hoc networks, Department of Computer Science, Rice University, Tech. Rep. TR01-384, June (2002).

Google Scholar

[9] S. A. Camtepe and B. Yener, Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, Department of Computer Science, Rensselaer Polytechnic Institute, Technical Report TR-05- 07, March 23, (2005).

Google Scholar

[10] R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84, Lecture Notes in Computer Science, Springer-Verlag, 1985, 209: 335–338.

DOI: 10.1007/3-540-39757-4_22

Google Scholar

[11] C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfectly-secure key distribution for dynamic conferences, Lecture Notes in Computer Science, 1993, 740: 471–486.

DOI: 10.1007/3-540-48071-4_33

Google Scholar

[12] G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill, Integrated Coverage and Connectivity Configuration for Energy Conservation in Sensor Networks, ACM Transactions on Sensor Networks, (2005).

DOI: 10.1145/1077391.1077394

Google Scholar

[13] T. Yan, T. He, and J. Stankovic, Differentiated Surveillance for Sensor Networks, in ACM SenSys, (2003).

Google Scholar

[14] Z. Abrams, A. Goel, and S. Plotkin, Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks, in ACM/IEEE IPSN, (2004).

DOI: 10.1145/984622.984684

Google Scholar

[15] C. Hsin and M. Liu, Network Coverage using Low Duty- Cycled Sensors; Random and Coordinated Sleep Algorithms, in ACM/IEEE IPSN, (2004).

DOI: 10.1145/984622.984685

Google Scholar

[16] J. Hwang, T. He, and Y. Kim, Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks, in ACM SenSys, (2007).

Google Scholar

[17] S. Kumar, T. Lai, and A. Arora, Barrier Coverage With Wireless Sensors, in ACM MobiCom, (2005).

Google Scholar

[18] X. Luo, M. Dong, and Y. Huang, On Distributed Fault-Tolerant Detection in Wireless Sensor Networks, IEEE Transactions on Computers, vol. 55, no. 1, p.58–70, (2006).

DOI: 10.1109/tc.2006.13

Google Scholar

[19] T. Clouqueur, K. K. Saluja, and P. Ramanathan, Fault Tolerance in Collaborative Sensor Networks for Target Detection, IEEE Transactions on Computers, vol. 53, no. 3, p.320–333, (2004).

DOI: 10.1109/tc.2004.1261838

Google Scholar

[20] N. Katenka, E. Levina, and G. Michailidis, Local Vote Decision Fusion for Target Detection in Wireless Sensor Networks, IEEE Transactions on Signal Processing, vol. 56, no. 1, p.329–338, (2008).

DOI: 10.1109/tsp.2007.900165

Google Scholar

[21] M. Yarvis et al., Exploiting Heterogeneity in Sensor Networks, IEEE INFOCOM, (2005).

Google Scholar