Comparative Analysis of Hop-to-Hop and End-to-End Secure Communication

نویسندگان

  • Shital Y. Gaikwad
  • U. V. Kulkarni
چکیده

End-to-End secure communication between sensor and sink is important in network communication management. In majority cases End-toEnd secure communication is largely ignored since most of us give importance to Hop-to-Hop communication. Endto-End secure communication protocol in randomly deployed wireless sensor network is based on methodology called differentiated key pre-distribution [19]. Here, the main idea is to distribute different number of keys to different sensors to speed up the resilience of certain links. To determine the optimum protocol parameters in the End-to-End Secure communication, the theoretical analysis is necessary and it is being discussed in this paper. It is observed that End-to-End solution can provide secure communication between the sensor nodes and the sink in the Wireless Sensor Network (WSN). The theoretical analysis was practically attempted to prove its work and same been discussed in this paper.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Energy Efficient Reliable Routing Algorithms for Wireless Ad-hoc Network

To address the problem of energy efficient reliable routing in wireless networks in the presence of unreliable communication links or devices or lossy wireless link layers by integrating the power control techniques into the energy efficient routing. This work deals with the problem of energy-efficient reliable wireless communication in the presence of unreliable or loss wireless link layers in...

متن کامل

A Lightweight Secure SIP Model for End-to-End Communication

Session Initiation Protocol (SIP) is a signaling standard approved by IETF for real-time multimedia session establishment. Increasingly wide deployment brings much concern on SIP security. Current solutions for end-to-end signaling security either require user-side powerful performance support for heterogeneous security mechanisms, or assume that trust relationship is transitive and static. Yet...

متن کامل

Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying

This paper investigates the secure communication in a two-hop cooperative wireless network, where a bufferaided relay is utilized to forward data from the source to destination, and a passive eavesdropper attempts to intercept data transmission from both the source and relay. Depending on the availability of instantaneous channel state information of the source, two cases of transmission mechan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013