Providing Good Coverage and Secure Connectivity Using Key Pre-Distribution Scheme for Wireless Sensor Networks

Authors

  • A. Haritha  MCA Sri Padmavathi College of Computer Science and Technology, Tiruchanoor, Tirupathi, Andhra Pradesh, India

Keywords:

Wireless sensor networks, security, key management, network scalability, secure connectivity coverage.

Abstract

Now A Days, wireless device networks (WSNs) are more and more utilized in important applications inside many fields as well as military, medical and industrial sectors. Given the sensitivity of those applications, sophisticated security services square measure needed. Key management may be a corner stone for several security services like confidentiality and authentication that are needed to secure communications in WSNs.In existing system, we discover most Rate Of Networked Computation during a Capacitated Network during this they focused only on network capability they didn't about secure connectivity it means that giving security to that information whereas transfer from source to destination. This is often the massive disadvantage in existing system. To overcome this problem we tend to move to proposed model. we propose a new scalable key management scheme for WSNs that provides a good secure connectivity coverage. For this purpose, we tend to make use of the unital design theory. We tend to show that the basic mapping from unitals to key pre-distribution allows us to attain high network scalability. Nonetheless, this naive mapping doesn't guarantee a high key sharing probability. Therefore, we tend to propose an enhanced unital-based key pre-distribution theme providing high network scalability and good key sharing probability approximately lower bounded by 1 ? e?1 ? 0.632. we tend to conduct approximate analysis and simulations and compare our solution to those of existing methods for different criteria like storage overhead, network scalability, network connectivity, average secure path length and network resiliency. Our results show that the proposed approach enhances the network scalability whereas providing high secure property coverage and overall improved performance.

References

  1. Prabal Dutta et al., "Design and Evaluation of Versatile and Efficient Receiver-Initiated Link Layer for Low-Power Wireless", SenSys, 2010.
  2. E.R. Musaloiu, C Liang, A Terzis, "Koala: Ultra-Low Power Data Retrieval in Wireless Sensor Networks", IPSN, 2008.
  3. E.R. Musaloiu, C Liang, A Terzis, "Koala: Ultra-Low Power Data Retrieval in Wireless Sensor Networks", IPSN, 2008.
  4. J. Ansari, X. Zhang, P. Mahonen, "Multi-radio Medium Access Control Protocol for Wireless Sensor Networks", DCOSS, 2008.
  5. Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a survey," IEEE Commun. Surv. Tuts., vol. 10, no. 1–4, pp. 6–28, 2008.
  6. L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. 2002 ACM CCS, pp. 41–47.
  7. H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE SP, pp. 197–213, 2003.
  8. W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in Proc. 2004 IEEE INFOCOM, pp. 586–597.
  9. C. Castelluccia and A. Spognardi, "A robust key pre-distribution protocol for multi-phase wireless sensor networks," in Proc. 2007 IEEE Securecom, pp. 351–360.
  10. D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proc. 2003 ACM CCS, pp. 52–61.
  11. Z. Yu and Y. Guan, "A robust group-based key management scheme for wireless sensor networks," in Proc. 2005 IEEE WCNC, pp. 1915 1920.
  12. S. Ruj, A. Nayak, and I. Stojmenovic, "Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial
  13. designs," in Proc. 2011 IEEE INFOCOM, pp. 326–330.
  14. S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in Proc. 2003 ACM CCS, pp. 62–72.
  15. S. A. C¸ amtepe and B. Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks," IEEE/ACM Trans. Netw., vol. 15, pp. 346–358, 2007.
  16. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "Spins: security protocols for sensor netowrks," in Proc. 2001 ACM MOBICOM, pp. 189–199.
  17. Maala, Y. Challal, and A. Bouabdallah, "Hero: hierarchcal key management protocol for heterogeneous WSN," in Proc. 2008 IFIP WSAN, pp. 125–136.
  18. W. Bechkit, Y. Challal, and A. Bouabdallah, "A new scalable key predistribution scheme for WSN," in Proc. 2012 IEEE ICCCN, pp. 1–7.
  19. J. Zhang and V. Varadharajan, "Wireless sensor network key management survey and taxonomy," J. Netw. Comput. Appl., vol. 33, no. 2, pp. 63–75, 2010.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
A. Haritha, " Providing Good Coverage and Secure Connectivity Using Key Pre-Distribution Scheme for Wireless Sensor Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.446-450, March-April-2018.