Dynamism and Reminiscence-Capable Key Management Technique for Portable Heterogeneous Sensor Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-31 Number-3
Year of Publication : 2016
Authors : S.Thylashri, C.Shanmuganathan, Dr.P.Raviraj
DOI :  10.14445/22315381/IJETT-V31P230


S.Thylashri, C.Shanmuganathan, Dr.P.Raviraj "Dynamism and Reminiscence-Capable Key Management Technique for Portable Heterogeneous Sensor Networks", International Journal of Engineering Trends and Technology (IJETT), V31(3),169-173 January 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Wireless Sensor Network (WSN technology is being gradually more adopted during a big variety of applications loco mote from home/building and industrial automation to additional safety critical applications together with e-health or infrastructure monitoring. Considering quality within the on top of application scenarios truly introduces further technological challenges, especially with regard to security. The resource aberrant devices be supposed to be strong to numerous security attacks and communicate firmly whereas they ‘re residence the thought-about environment to the current aim, correct authentication and key management schemes supporting node quality should be used. This paper presents an efficient mutual authentication and key establishment theory for heterogeneous sensor network consisting of various mobile Sensor nodes and solely some additional powerful fixed sensor nodes. The obtained results show that the proposed resolution assures higher network propert y, consumes less memory, has low communication overhead throughout the authentication and key establishment section and has higher network resilience against mobile nodes attacks compared with existing approaches for authentication and key establishment.


[1] Khan, Sarmad Ullah; Lavagno, Luciano; Pastrone, Claudio; Spirito, Maurizio; ,"An effective key management scheme for mobile heterogeneous sensor networks," Information Society (i- Society), 2011 International Conference on, vol., no., pp.98-103, 27-29 June 2011.
[2] Maerien, J.; Michiels, S.; Huygens, C.; Joosen, W.; , "MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks," Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on , vol., no., pp.121-128, 11-13 Oct. 2010.
[3] Xiaojiang Du; Yang Xiao; Song Ci; Guizani, M.; Hsiao-Hwa Chen; , "A Routing Driven Key Management Scheme for Heterogeneous Sensor Networks," Communications, 2007. ICC07.IEEE International Conference on,vol.,no.,pp.3407- 3412,24-28June 2007.
[4] Fang Liu, Maiou Jose “Manny ” Rivera, Xiuzhen Cheng, “Location-Aware Key Management in wireless sensor networks”, IWCMC’06, 2006.
[5] Yarvis, M.; Kushalnagar, N.; Singh, H.; Rangarajan, A.; Liu, Y.; Singh, S.; , "Exploiting heterogeneity in sensor networks," INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE , vol.2, no., pp. 878- 890 vol. 2, 13-17 March 2005.
[6] Sanchez, D.S.; Baldus, H.;"A Deterministic Pairwise Key Predistribution Scheme for Mobile Sensor Networks," Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on , vol., no., pp. 277- 288, 05-09 Sept. 2005.
[7] A. Perrig, R. Szewczyk, J. Tygar, Victorwen, and D. E. Culler, “Spins: Security Protocols for Sensor Networks”, ACM Wireless Networking, Sept. 2002.
[8] L. Eschenauer and V. D. Gligor, “A key management scheme for distributed sensor networks”, Proc. of the 9th ACM Conference on Computer and Communication Security, Nov. 2002. pp. 41-47.
[9] Kaixin Xu; Xiaoyan Hong; Gerla, M.; , "An ad hoc network with mobile backbones," Communications, 2002. ICC 2002. IEEE International Conference on , vol.5, no., pp. 3138- 3143 vol.5, 2002.
[10] Eduru Hariprasad, J.S.V.R.S.Sastry, N. Subhash Chandra “Vastly Efficient Key Pre Distribution and Authentication scheme for Wireless Sensor Networks,”International Journal of Computer Science and Engineering (IJETT-IJCSE) – volume1 issue7 September 2014.

Wirless Sensor Networks, Key Management, Security; Heterogeneous Networks, Portable Nodes.