Improving Connectivity and Resilience using ECC based Key Predistribution for deployment knowledge based WSN

نویسندگان

  • R. KISHORE
  • S. RADHA
  • L. CHERLYFLAR
چکیده

Wireless Sensor Networks consist of small nodes with sensing, computation and communication capabilities, often deployed in remote inaccessible areas to interact with the environment and forward the measured event to the base station, thus posing several possibilities of physical attacks. Hence security becomes an important issue in wireless sensor networks. For resource constrained environments like wireless sensor networks key predistribution is found to be better choice. Another significant information regarding network is the deployment knowledge which can be used to improve the performance of the key predistribution schemes. Deployment knowledge offers numerous advantages when used in resource constrained environments, achieving better storage, better resilience to node capture, minimizing the number of keys and reduce network overhead. The main objective of this paper is to propose a novel scheme where keys are generated using Elliptic Curve Cryptography and predistributed into the nodes. Nodes are deployed in the area of interest considering hexagonal deployment knowledge and the links are formed based on the common keys of private key ring in each node. The performance of the system is evaluated in terms of resilience and connectivity. The results show that the connectivity and resilience of the network is better when compared to other existing key predistribution schemes. Key-Words: Security, Key Predistribution, Elliptic Curve Cryptography, Elliptic Curve Points, Connectivity, Resilience

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity

In wireless sensor network (WSN), preditibution of cryptographic keys is possibly the most practical approach to perfect network communications. In this paper, we propose a new secret key predistribution scheme to achieve a higher connectivity in WSN. For this we combine a random key predistribution scheme and hash chain method based on the prior knowledge of sensor node deployment. The propose...

متن کامل

Highly Secure Key Predistribution Using Affine Planes and Reed Muller Codes in Wireless Sensor Networks

Wireless Sensor Networks (WSN) consist of low powered and resource constrained sensor nodes which are left unattended for long duration of time. Hence it is very challenging to design and implement cost effective security protocols for such networks. Thus symmetric key cryptographic techniques are preferred over public key techniques for communication in such scenarios. Prior to deployment, key...

متن کامل

Key Pre-Distribution Protocol For Multi-Phase Circulated Wireless Sensor Networks

To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is non-trivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and public-key based sche...

متن کامل

Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks

Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key predistribution (kpd) which involves preloading keys in sensor nodes, has been considered as the best solution for key management when sensor nodes are battery powered and have to work unattended. This paper proposes a meth...

متن کامل

Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario

In sensor networks, secure communication among sensor nodes requires secure links and consequently secure key establishment. Due to resource constraints, achieving such key establishment is non-trivial. Recently some random key predistribution techniques have been proposed to establish pairwise keys. Some of these approaches assume certain deployment knowledge is available prior to deployment a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012