A Hybrid Key Management Scheme for Data Transmission in Wireless Sensor Networks
M.Infant Angel1 , R.Sudha 2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 787-793, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.787793
Online published on Mar 31, 2019
Copyright © M.Infant Angel, R.Sudha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: M.Infant Angel, R.Sudha, “A Hybrid Key Management Scheme for Data Transmission in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.787-793, 2019.
MLA Style Citation: M.Infant Angel, R.Sudha "A Hybrid Key Management Scheme for Data Transmission in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 7.3 (2019): 787-793.
APA Style Citation: M.Infant Angel, R.Sudha, (2019). A Hybrid Key Management Scheme for Data Transmission in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 7(3), 787-793.
BibTex Style Citation:
@article{Angel_2019,
author = {M.Infant Angel, R.Sudha},
title = {A Hybrid Key Management Scheme for Data Transmission in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {787-793},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3918},
doi = {https://doi.org/10.26438/ijcse/v7i3.787793}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.787793}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3918
TI - A Hybrid Key Management Scheme for Data Transmission in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - M.Infant Angel, R.Sudha
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 787-793
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
259 | 275 downloads | 128 downloads |
Abstract
In Wireless Sensor Networks (WSNs), many application scenarios, traditional WSNs with static sink nodes will be replaced by Mobile Sinks (MSs), and also the corresponding application needs secure communication surroundings. Key Management is that the most crucial issue within the security of Wireless detector Networks. Current key management researches pay less concentration to the safety of detector networks with MS. This paper proposes a hybrid key management system supported a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be working in WSNs with Mobile Sink. The system takes full remuneration of those two sorts of ways to boost the excellent problem of the key system. It constructs the oppose have to be compelled to capture a big range of nodes within the network to decrypt the keys since it is to have the polynomial coefficients and random keys at a corresponding time so as to confine the uncompromised nodes. The encryption procedure is performed by utilizing an AES algorithm. Message digest algorithm is used for key generation. Simulation evidently shows that the theme of the research work performs higher in terms of network resilience, property and storage effectiveness compared to alternative wide used schemes.
Key-Words / Index Term
Wireless sensor networks, Hybrid key, Polynomial pool based key, Basic random key
References
[1]. Yi Ren, Member, IEEE, Vladimir I. Zadorozhny, Senior Member, IEEE,Vladimir A. Oleshchuk, Senior Member, IEEE, and Frank Y. Li, Senior Member, IEEE, “A Novel Approach to Trust Management in Unattended Wireless Sensor Networks” IEEE transactions on mobile computing, vol. 13, no. 7, July 2014
[2]. Xiaojiang Du, North Dakota State University Hsiao-Hwa Chen, National Cheng Kung University “Security In Wireless Sensor Networks”, IEEE wireless communications August 2008.
[3]. Chen X. MakkiK.Yen K. and Pissinou N. ‘Sensor network security: A survey’, IEEE Commun. Surv. Tuts, vol. 11, no. 2, pp. 52–73Apr./Jun. 2009.
[4]. Zhou Y. Zhang Y. and Fang Y. ‘Access control in wireless sensor networks’, Ad Hoc Netw, vol. 5, no. 1, pp. 3–13 May 2007.
[5]. Kwon T, Hong J. Learning on the job: Secure and Efficient Broadcast Authentication in Wireless Sensor Networks. IEEE Transactions on Computing. 2010 Jun 24; 59(8):1120– 33.
[6]. Khan AS, Fisal N, Bakar ZA, Salawu N, Maqbool W, Ullah R, Safdar H. Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks. Indian Journal of Science and Technology. 2014 Mar; 7(3):282–95.
[7]. Klaoudatou E, Konstantinou E, Kambourakis G, Gritzalis S. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs. IEEE Communications Surveys & Tutorials. 2011; 13(3).
[8]. Zhang J, Varadharajan V. Learning on the job: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications. 2010 Mar; 33(2):63–75.
[9]. Varma AGNS, Reddy AKG, Theja RY, Arunkumar T. Cluster Based Multipath Dynamic Routing (CBDR) Protocol for Wireless Sensor Networks Indian Journal of Science and Technology. 2015 Jan; 8(S2):17–22.
[10]. Simplicio-Jr MA, Barreto PS, Margi CB, Carvalho TC. A survey on key management mechanisms for distributed wireless sensor networks. Computer Networks. 2010 Oct 28; 54(15):2591–612.
[11]. Shang F, Abolhasan M, Wysocki T. An Energy-Efficient adaptive Clustering Algorithm for Wireless Sensor Networks. International Journal of Information Acquisition. 2009; 6(2):117–26.
[12]. Gomathi K, Parvathavarthini B. An Enhanced Distributed Weighted Clustering Routing Protocol for Key Management. Indian Journal of Science and Technology. 2015 Feb; 8(4):342.
[13]. Yuhua L, Yongfeng Z, Jingju GA. New Clustering Mechanism Based on LEACH Protocol. Proceedings of the International Joint Conference on Artificial Intelligence. IEEE Communications Society; 2009 Apr. p. 25–6.
[14]. Liu D, Ning P, Li R. Establishing Pairwise Keys in Distributed Sensor Networks Proceedings 10th ACM Conference Computers and Communication Security; 2003. p. 52–61.
[15]. Diffie, W., Hellman, M. 1976. New direction in cryptography. IEEE Trans. on Info. Theory, Vol. IT-22, Nov. 1976, pp. 644-654 (Invited Paper).
[16]. Eltoweissy, M., Heydari, H., Morales, L., and Sadborough, H. 2004. Combinatorial Optimization of Group Key Management, J. Network and Systems Management 12(1), 33-50.
[17]. Eschenauer, L. and Gligor, V. D. 2002. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (Washington, DC, USA, November 18 - 22, 2002).
[18]. V. Atluri, Ed. CCS `02. ACM, New York, NY, 41-47. DOI= http://doi.acm.org/10.1145/586110.586117.
[19]. Ghumman, K. 2006. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 17, 8 (Aug. 2006), 865- 882. DOI= http://dx.doi.org/10.1109/TPDS.2006.106
[20]. P. LourduGracy, D. Venkatesan, “An Honey Encryption Based Efficient Security Mechanism For Wireless Sensor Networks”. Volume 118 No. 20 2018, 3157-3164, IJPAM, 2018.
[21]. Swapna Naik, “A Novel Authentication approach in Wireless sensor Network Swapna Naik “, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014
[22]. Manish P. Gangawane,” Implementation Of Zero Knowledge Protocol In Wireless Sensor Network for prevention Of Various Attacks,” International Journal of Emerging Technology and Advanced Engineering , (ISSN 2250-2459, Volume 2, Issue 8, August 2012).
[23]. A Jayanthiladevi, S Suma and T.Lalitha, “Challenges and Authentication in Wireless Sensor Networks,” 2013 IEEE.
[24]. Mahmood Khalel, Ibrahem and Al Nahrain,” Modification of Diffie–Hellman Key Exchange Algorithm for Zero Knowledge Proof,” proceedings of 2012 international conference on future c ommunication networks, IEEE 2012.
[25]. SamantKhajuria and Henrik Tange, “Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curve Cryptography,” proceedings of IEEE 2009.
[26]. L. B. Jivanadham ,A.K.M. ,M. Islam2 and Mansoor3,“A Secured Dynamic Cluster-Based Wireless Sensor Network Advanced Informatics School (AIS),” proceedings of 2012 Fourth International Conference on Computational Intelligence,
[27]. Xiaoyong Li, Feng Zhou, and JunpingDu,“LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks”,IEEE transactions on information forensics and security, vol. 8, no. 6, June 2013
[28]. Yi Ren, Member, IEEE, Vladimir I. Zadorozhny, Senior Member, IEEE,Vladimir A. Oleshchuk, Senior Member, IEEE, and Frank Y. Li, Senior Member, IEEE, “A Novel Approach to Trust Management in Unattended Wireless Sensor Networks” IEEE transactions on mobile computing, vol. 13, no. 7, July 2014
[29]. Guoxing Zhan, Weisong Shi, Senior Member, IEEE, and Julia Deng. IEEE “Design and Implementation of TARF: A Trust-Aware Routing Framework for wsns”, transactions on dependable and secure computing, vol. 9, no. 2, March/April 2012.
[30]. Chen X. Makki K.Yen K. and Pissinou N. ‘Sensor network security: A survey’, IEEE Commun . Surv. Tuts, vol. 11, no. 2, pp. 52–73Apr./Jun. 2009.
[31]. Zhou Y. Zhang Y. and Fang Y. ‘Access control in wireless sensor networks’, Ad Hoc Network, vol. 5, no. 1, pp. 3–13 May 2007.
[32]. Sudha.R, Devapriya.M,” Enhanced bio-trusted anonymous authentication routing technique of wireless body area network “,Biomedical Research 2016; Special Issue: S276-S282 , Special Section: Computational Life Science and Smarter Technological Advancement, ISSN 0970-938X.
[33]. Yang Xiao, “A survey of key management schemes in wireless sensor networks”, 2007 Elsevier B.V. All rights reserved. doi:10.1016/j.comcom.2007.04.009
[34]. Syed Muhammad et al, “Key Management Schemes of Wireless Sensor Networks: A Survey” ,http://uclab.khu.ac.kr
[35]. A.Pranusha , “A Hybrid Key Management Scheme For Secure Manet Communications”, eISSN: 2319-1163 | pISSN: 2321-7308
[36]. R.Sudha, P.Nivetha,” A Novel Approach For Secure Data Transmission Using Cp_Abe And Md5 Algorithm In Wban”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 6, Issue 3, May- June 2017 ISSN 2278-6856