A NOVEL KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS

Prashant Gautam, Navdeep Kaur Saluja

Abstract


The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by Key management plays a fundamental role in cryptography is to  provide confidentiality, entity authentication, data origin authentication, data integrity, and digital signatures. The goal of a good cryptographic design is to reduce more complex problems to the proper management and safe-keeping of a small number of cryptographic keys, ultimately secured through trust in hardware or software by physical isolation or procedural controls. This paper presents a simple, efficient and secure scheme for key generation, distribution and storage for wireless sensor networks. The proposed algorithm is simulated using Matlab and compared with standard key management algorithm. The Proposed Algorithm shows that the delivery of rekeying messages reduces the communication of rekeying messages by about 5 times and storage space also reduced using Gaussian and normal PDF.


Keywords


sensor network, key management, Gaussian pdf, normal pdf, Cryptography.

Full Text:

PDF

References


REFERENCES

S.Marti, T.Giuli, K.Lai, and M.Baker, (2000), "Mitigating routing misbehavior in mobile ad hoc networks”, Proc. ACM International Conference on Mobile Computing and Networking, pp. 255–265.

Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, and Michael Galloway, (2007), "A survey of key management schemes in wireless sensor networks". Science direct, Computer Communications, pp. 2314–2341.

K.Kim, Y.Zhang, W.Yang, and M.Park, (2008), "An authentication protocol for hierarchy-based wireless sensor networks", in Proc. IEEE International Symposium on Computer and Information Sciences, pp. 1–6.

Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, and Michael Galloway, (2007), "A survey of key management schemes in wireless sensor networks". Science direct, Computer Communications, pp. 2314–2341.

Mohammed A. Abuhelaleh, and Khaled M. Elleithy, (2010), “SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN”, International

Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, pp. 67-78.

Ritu Sharma, Yogesh Chaba, and Yudhvir Singh, (2010), "An IPC Key Management Scheme for Wireless Sensor Network, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), pp. 251-255.

Yuan Zhang, Yongluo Shen, and SangKeun Lee, (2010), "A Cluster-Based Group Key Management Scheme forWireless Sensor Networks", 2010 12th International Asia-Pacific Web

Conference, pp. 386-388.

Lanying Li, and Xin Wang, (2010), "A high security dynamic secret key management scheme for Wireless Sensor Networks", Third International Symposium on Intelligent Information Technology and Security Informatics, pp. 507-510.

A. Shamir, (1979 ), "How to share a secret",Communications of the ACM, pp. 612–613.

R. Srinivasan,,” Secure Group Key Management Scheme for Multicast Networks,” International Journal of Network Security, Vol.11, No.1, PP.33-38, July 2010.

Harjot Bawa, Parminder Singh and Rakesh Kumar "An Efficient Novel Key management scheme using NchooseK algorithm for Wireless Sensor Networks"International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.6, November 2012.

Khawla Naji Shnaikat and Ayman Ahmed AlQudah " KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS", International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, PP.49-63, November 2014.


Refbacks

  • There are currently no refbacks.