Mobility Based Key Management Security Scheme for Wireless Sensor Networks
详细信息    查看全文
  • 作者:T. Lalitha ; S. Jayaprabha
  • 关键词:Mobility ; Wireless sensor network ; Cluster ; Key management ; Authentication
  • 刊名:Wireless Personal Communications
  • 出版年:2016
  • 出版时间:March 2016
  • 年:2016
  • 卷:87
  • 期:2
  • 页码:349-367
  • 全文大小:1,162 KB
  • 参考文献:1.de Brito, L. M. P. L., & Peralta, L. M. R. (2008). An analysis of localization problems and solutions in wireless sensor networks. Polytechnical Studies Review, 6(9), 1–27.
    2.Lee, H., & Aghajan, H. (2005). Collaborative self-localization techniques for wireless image sensor networks. In Proceedings of the asilomar conference on signals, systems and computer s.
    3.Abuhelaleh, M. A., & Elleithy, K. M. (2010). Security in wireless sensor networks: Key management module in SOOAWSN. International Journal of Network Security & Its Applications (IJNSA), 4, 67–78.CrossRef
    4.Lalitha, T. (2012). Energy efficient cluster based key management & authentication technique for wireless sensor networks. European Journal of Scientific Research, 76(3), 403–410.
    5.Jeong, Y. S., & Lee, S. H. (2006). Secure key management protocol in the wireless sensor network. Inter J. Inform. Proc. Syst. 2.
    6.Dwoskin, J., Xu, D., Huang, J., Chiang, M., & Lee, R. (2007). Secure key management architecture against sensor-node fabrication attacks. In Proceedings of the IEEE global telecommunications confe rence, Nov. 26–30 (pp. 166–171). Washington, DC: IEEE Xplore Press. doi:10.​1109/​GLOCOM.​2007.​39
    7.Jain, Y. K., & Jain, V. (2011). An efficient key management scheme for wireless network. International Journal of Scientific and Engineering, 2(2), 1–7.
    8.Maala, B., Bettahar, H., & Bouabdallah, A. (2008). Performances of key management schemes in wireless sensor networks. Singapore: World Scientific Rev.
    9.Shen, L., & Shi, X. (2008). A dynamic cluster-based key management protocol in wireless sensor networks. International Journal of Intelligent Control and Systems, 13, 146–151.
    10.Kim, Y. H., Lee, H., & Lee, D. H. (2007). A secure and efficient key management scheme for wireless sensor networks. In Third International Conference on Security and Privacy in Communications Networks and the Workshops, Sept. 17–21 (pp. 162–167). Nice, France: IEEE Xplore Press. doi:10.​1109/​SECCOM.​2007.​4550324
    11.Shaikh, R. A., Jameel, H., Auriol, B. J., Lee, H., Lee, S., & Song et al., Y. J. (2010). Achieving network level privacy in wireless sensor networks. Sensors, 10(3), 1447–1472.
  • 作者单位:T. Lalitha (1)
    S. Jayaprabha (2)

    1. Sona College of Technology, Salem, Tamil Nadu, 636005, India
    2. Jayam College of Engineering and Technology, Dharmapuri, Tamil Nadu, 636813, India
  • 刊物类别:Engineering
  • 刊物主题:Electronic and Computer Engineering
    Signal,Image and Speech Processing
    Processor Architectures
  • 出版者:Springer Netherlands
  • ISSN:1572-834X
文摘
In wireless sensor networks (WSNs) handling mobility of nodes in key management is a challenging task. In this paper, a mobility management technique for keying scheme of WSNs is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pairwise keys for nodes are generated by the sink through exclusion basis systems. Whenever a node moves from currently connected cluster to another in the network, the mobility based key management scheme is triggered. The sink verifies the authenticity of roaming node and allocates it to a nearby cluster. New pairwise keys are generated and transmitted to the roaming node through newly connected cluster head. Further, a key organization technique is presented to ensure the forward and backward secrecy of nodes. The proposed technique is simulated in NS2 and simulation results show the efficiency of our technique.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700