Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Wireless sensor networks (WSN) are a collection of sensor nodes, which is deployed spatially among various environments. WSNs are deployed in environments where wired networks are difficult to set up. They are mainly used to record sensitive information regarding physical or environmental conditions. As they collect sensitive information, secure and accurate transmission of data is important. For secure transmission of data, key management is a corner stone in wireless sensor networks. Wireless sensor networks are infrastructure less. Due to this reason, key distribution among increasing number of nodes by third parties is a challenging problem. Hence, symmetric key pre-distribution algorithms areintroduced for key distribution. However, most schemes suffer from low scalability, high storage overhead and it is difficult to implement security with existing solutions. In order to provide good key sharing and secure connectivity, an asymmetric algorithm called elliptical curve cryptography (ECC) will be used. After collecting data from deployed environment, sensor nodes will send data to sink node, which receives data and process the information. Data will be routed to sink node in secure environment using shortest path routers. The schemes will be implemented in java programming language and results would be derived to show/compared for more efficiency in terms of secure connectivity, storage overhead, computational cost and communication cost.

Authors and Affiliations

D. S. S. L. Sruthi , D. Sesha Manoj, I. Ravi Prakash Reddy

Keywords

Related Articles

 An Improved Feature Vector storage metric for fast Android Malware Detection Framework

Abstract: Android based devices are rapidly flourishing day-by-day, due to its ease of use and popularity. As a result, the number of malware attacks on Android is also increasing. This paper is based on the Text Mininga...

Structural Analysis of RF Architecture using Crossbar Type Topology for Cryptographic Application

Abstract: The strongly emerging class, Coarse-Grained Re-configurable Architecture (CGRA) is currently receiving attention and also having excellent performance with flexibility in fabrication. An entire range of compone...

 Prevention of Selective Jamming Attacks by Using Packet Hiding  Methods

 The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch &nbs...

Mining High Utility Itemsets from its Concise and Lossless Representations

Abstract: Mining high utility items from databases using the utility of items is an emerging technology.Recent algorithms have a drawback in the performance level considering memory and time.Novel strategy proposed here...

 Web Logs Analysis for Finding Brand Status

 Abstract: Due to rapid development of the web there has been vast increase in the user generated contents available in the form of blogs ,product reviews sites, web- forums and online social networks etc. Such revi...

Download PDF file
  • EP ID EP164772
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

D. S. S. L. Sruthi, D. Sesha Manoj, I. Ravi Prakash Reddy (2016). Secure Strategy for Key Pre-Distribution in Wireless Sensor Networks. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 23-33. https://www.europub.co.uk/articles/-A-164772