Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Improving Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Networks using Collision-Keys

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 70 - Number 23
Year of Publication: 2013
Authors:
Vijay Kumar
Priyanka Ahlawat
10.5120/12211-8361

Vijay Kumar and Priyanka Ahlawat. Article: Improving Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Networks using Collision-Keys. International Journal of Computer Applications 70(23):40-44, May 2013. Full text available. BibTeX

@article{key:article,
	author = {Vijay Kumar and Priyanka Ahlawat},
	title = {Article: Improving Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Networks using Collision-Keys},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {70},
	number = {23},
	pages = {40-44},
	month = {May},
	note = {Full text available}
}

Abstract

Wireless Sensor Networks (WSNs) consist of a large number of sensor nodes that are batteries powered, equipped with limited memory and computational capabilities. These constrained devices face many security threats and thus there is a need of some cryptographic mechanism for secure communication. Key distribution is of critical importance to provide security in WSNs. Till now a number of key distribution schemes are proposed in the literature but there are very few schemes considering mobility of sensor nodes. In this paper we have proposed a modification to the key management scheme supporting node mobility in heterogeneous sensor network. Our modification uses Hash collision keys to improve the network resilience and connectivity between the nodes. We have evaluated our scheme analytically and obtained results show that our proposed solution assures better network connectivity and resilience while increasing an insignificant computational overhead.

References

  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci "Wireless Sensor Networks: a survey," Computer networks 38(4):393-422, 2002
  • H. Zhao, J. Hu, J. Qin, V. Varadharajan and H. Wan, "Hashed Random Key Pre-Distribution Scheme for Large Heterogeneous Sensor Networks," IEEE 11th Inter. Conf. on Trust, Security and Privacy in Computing and Communications, 2012.
  • A. K. Das, "Improving identity-based Random key Establishment Scheme for large scale hierarchical Wireless Sensor Networks," International Journal of Network Security 13 (3):181-201, 2011.
  • S. U. Khan, L. Lavagno and C. Pastrone, "A key management scheme supporting node mobility in Heterogeneous Sensor Networks," IEEE 6th inter. Conf. on Emerging Technologies (ICET), 2010.
  • Jiri Kur, Vashek Matyas and P. Svenda, "Two Improvements of Random Key Predistribution for Wireless Sensor Networks," in Proceedings of the 8th International Conference on Security and Privacy in Communication Networks, SecureComm 2012.
  • M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu and S. Singh, "Exploiting the heterogeneity in sensor networks", INFOCOM'05,2005.
  • L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. ACM Conf. Computer and Communication Security, pp: 41–47, 2002.
  • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P'03), 2003.
  • S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach," in Proc. IEEE ICNP, 2003.
  • X. Du, F. Lin, "Maintaining differentiated coverage in Heterogeneous sensor networks", EURASIP Journal on Wireless Communication and Networking, (4):565-572, 2005.
  • P. Traynor, R. Kumar, H. Bin Saad, G. Cao, T. La Porta, "Efficient hybrid security mechanism for heterogeneous sensor networks," IEEE Trans. On Mobile Computing 6(6):663-677,2007.
  • L. Girod et al, "A system for simulation, emulation and deployment of heterogeneous sensor networks", in Proceedings of ACM SenSys, 2004.
  • A. S. Poornima, B. B. Amberker, "Tree-based Key Management Scheme for Heterogeneous Sensor Networks". 16th IEEE inter. Conference on Networks, 2008.
  • W. T. Zhu, J. Zhou, R. H. Deng, F. Bao, "Detecting node Replication attacks in wireless sensor networks: A Survey," Journal of Network and Computer Applications: 1022-1034, 2012.