Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN

نویسندگان

  • Özgür Saglam
  • Mehmet Emin Dalkiliç
چکیده

Security in Wireless Sensor Networks (WSN) can be achieved by establishing shared keys among the neighbor sensor nodes to create secure communication links. The protocol to be used for such a pairwise key establishment is a key factor determining the energy to be consumed by each sensor node during the secure network configuration. On the other hand, to achieve the optimum network configuration, nodes may not need to establish pairwise keys with all of their neighbors. Because, links to be established are defined by the network configuration protocol and as long as the network connectivity requirements are satisfied, number of links to be secured can be limited accordingly. In this sense, key establishment and network configuration performances are related to each other and this cross relation should be taken into consideration while implementing security for WSN. In this paper, we have investigated the cross layer relations and performance figures of the selected randomized pre-distribution and public key based key establishment protocols with the configuration protocol we proposed in a separate publication. Simulation results indicate that total network configuration energy cost can be reduced by reducing the number of links to be secured without affecting the global network connectivity performance. Results also show that the energy and resilience performances of the public key establishment can be better than the key pre-distribution for a given set of network configuration parameters.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Literature Review of MAC, Routing and Cross Layer Design Protocols for WSN

A WSN is composed of a large number of sensor nodes that are communicating using a wireless medium. The sensor nodes are deployed in the environment to be monitored in ad hoc structure. In WSN, there is sink node that collects data from all sensors, and usually not all nodes hear all other nodes. WSN is considered a multi-hop network. Although a WSN is a wireless multi-hop network, the ease of ...

متن کامل

Multi-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms

Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...

متن کامل

Introducing Intelligent Agents Potential into a competent Integral Multi-Agent Sensor Network Simulation Architecture Design

During this research we spot several key issues concerning WSN design process and how to introduce intelligence in the motes. Due to the nature of these networks, debugging after deployment is unrealistic, thus an efficient testing method is required. WSN simulators perform the task, but still code implementing mote sensing and RF behaviour consists of layered and/or interacting protocols that ...

متن کامل

Ant Colony inspired Self-Optimized Routing Protocol based on Cross Layer Architecture for Wireless Sensor Networks

Nowadays, wireless sensor networks (WSNs) are becoming increasingly beneficial, worthwhile and a challenging research area. The advancements in WSN enable a wide range of environmental monitoring and object tracking applications. Moreover, multihop (node by node) routing in WSN is affected by new devices constantly entering or leaving the network. Therefore, nature inspired self-maintained prot...

متن کامل

On Multi-Agent Strategies For Efficiently Designing Competent Integrated Hardware-Generic Simulation Systems of Wireless Sensor Networks

This research deals with several key issues concerning WSN design process. Due to the nature of these networks, debugging after deployment is unlikely, thus a wellorganized testing methodology is required. WSN simulators could achieve such a task, but still code implementing mote sensing and RF behaviour consists of layered and/or interacting protocols that for the sake of designing accuracy ar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1112.3844  شماره 

صفحات  -

تاریخ انتشار 2011