A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks

Article Preview

Abstract:

WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to well balance between the security level and the associated energy consumption overhead to mitigate the security risks. In this paper, we present A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks (NKMS). The security analysis demonstrates that NKMS is an effective solution to the key management of cluster based wireless sensor networks.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

864-868

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J. Zhang, V. Varadharajan, Wireless sensor network key management survey and taxonomy, Journal of Network and Computer Applications, vol. 33, no. 2, pp.63-75, (2010).

DOI: 10.1016/j.jnca.2009.10.001

Google Scholar

[2] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, Energy-efficient communication protocol for WSNs, in Proc. of the 33rd Hawaii International Conference on System Sciences, Washington, (2000).

DOI: 10.1109/hicss.2000.926982

Google Scholar

[3] Abdoulaye Diop, Yue Qi, Qin Wang, Shariq Hussain, An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks, . International Journal of Computer Science Issues (IJCSI), Vol. 10 Issue 1, p.490.

Google Scholar

[4] Y. Cheng and D. Agrawal, An improved key distribution mechanism for large-scale hierarchical wireless sensor networks, Ad Hoc Networks (Elsevier), vol. 5, no. 1, pp.35-48, (2007).

DOI: 10.1016/j.adhoc.2006.05.011

Google Scholar

[5] L. B. Oliveira, A. Ferreira, M. A. Vilaca, et al., SecLEACH-on the security of clustered sensor networks, Signal Processing, vol. 87, no. 12, pp.2882-2895, (2007).

DOI: 10.1016/j.sigpro.2007.05.016

Google Scholar

[6] P. Banerjee, D. Jacobson and S. N. Lahiri, Security and performance analysis of a secure clustering protocol for sensor networks, in Proc. 6th IEEE Intl. Symposium on Network Computing and Applications, 2007, pp.145-152.

DOI: 10.1109/nca.2007.40

Google Scholar

[7] D. Liu and P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in Proc. of the 10th Annual Network and Distributed System Security Symposium, California, (2003).

Google Scholar

[8] Otway D, and O. Rees, Efficient and Timely Mutual Authentication, Operating Systems Review, 21 (1987), 8-10.

DOI: 10.1145/24592.24594

Google Scholar