An Efficient Polynomial Pool - Based Scheme for Distributed Heterogeneous Wireless Sensor Networks

نویسندگان

  • M. Senthil Kumar
  • M. Gopinath
چکیده

The Sinks are vivacious in many wireless sensor network (WSN) solicitations for competent data accumulation, confined sensor reprogramming, and for extricating and revoking conceded sensors. However, in sensor networks that make use of the temporal key dissemination schemes for pairwise key naissance and endorsement between sensor nodes and mobile sinks, the engross of mobile sinks for data assortment exalts a new reassurance challenge: in the basic probabilistic and q-composite key redistribution schemes, a mugger can easily procure a hefty number of keys by apprehending a small fraction of nodes, and hence, can gain control of the network by arraying a simulated mobile sink preloaded with some conceded keys. This critique designates a multifarious level general framework that authorities the use of any pair wise key redistribution scheme as its basic component. The new framework necessitates two separate key pools, one for the mobile sink to retrieve the network, and one for pair wise key disposition between the sensors. To auxiliary condense the reimbursements initiated by predetermined access node replication attacks; we have underwired the authentication mechanism between the sensor and the stationary access node in the propositioned framework. Through detailed analysis, we show that our security framework has sophisticated network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Design and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks

Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Design and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks

Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013