Secure Data Spread using Dispersed Key Cohort Scheme in Wireless Sensor Networks

نویسنده

  • R. Kavitha
چکیده

In wireless sensor system to perceive bundle droppers and modifiers is the complex assignment. Multipath sending is utilized to treat with bundle droppers then neighbor checking methodology managed parcel modifiers. This plan devours more vitality in system. PNM (Probabilistic Nested Marking) plan utilized as a part of acknowledgement technique yet it ought not to channel the parcel. Notwithstanding the above plans, hub order calculation and heuristic positioning calculation are executed in sensor system. Hub classification calculation utilizes the dropping proportion to discover the awful hubs. Hub qualities are evaluated utilizing positioning calculation. These two plans take long time to discover the status of every hub and security peculiarities will help just for few assaults. In proposed framework, PKC (Public Key Cryptography) is generally utilized for show confirmation. Concentrated utilization of PKC for telecast verification, on the other hand, is thought to be unreasonable to asset obliged sensor hubs. The PKC based show verification plan utilizing mark amortization for Wireless Sensor Networks (WSNs). This plan abuses stand out Elliptic Curve Cryptography Digital Signature Algorithm (ECDSA) to verify all show messages. Along these lines, the overhead for the mark is amortized over all telecast messages. It holds high security that is as solid as ordinary PKC based telecast confirmation plans and likewise attain prompt validation that does not oblige time synchronization. For execution of this plan require a proficient open key circulation convention. Test consequences of a proving ground demonstrate that the overhead for validating a show message is lessened altogether.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014