Secure Key Generation and Transmission Protocol in Wireless Sensor Networks

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2016 by IJCOT Journal
Volume - 6 Issue - 2
Year of Publication : 2016
Authors : Ch.BhogeswaraRao, Ramesh Yegireddi, G.S.Pavan Kumar

Citation

Ch.BhogeswaraRao, Ramesh Yegireddi, G.S.Pavan Kumar"Secure Key Generation and Transmission Protocol in Wireless Sensor Networks", International Journal of Computer & organization Trends (IJCOT), V6(2):44-47 Mar - Apr 2016, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract We propose a dynamic and recursive group key generation protocol in wireless sensor networks with efficient authentication mechanism with block based signature. Key generation protocol is dynamic because key can be updated when a new member added to group list and key can be updated when user eviction. Block based signature mechanism applies signatures over individual blocks for authentication and cryptographic implementation maintains the data confidentiality.Our proposed result gives more efficient results than traditional approaches.

References-

[1] Simpli´cio, M.A. Jr., Barreto, P.S.L.M., Margi, C.B., Carvalho,T.C.M.B.: ‘A survey on key management mechanisms for distributedwireless sensor networks’, Comput. Netw. J., 2010, 54, (15),pp. 2591–2612
[2] Zhang, J., Varadharajan, V.: ‘Wireless sensor network key managementsurvey and taxonomy’, J. Netw. Comput. Appl., 2010, 33, pp. 63–75
[3] Samundiswary, P., Priyadarshini, P., Dananjayan, P.: ‘Performanceevaluation of heterogeneous sensor networks’. IEEE Int. Conf. onFuture Computer and Communication, 2009, pp. 264–267
[4] Eltoweissy,M.; Moharrum,M.; Mukkamala,R.; Dynamic key management in sensor networks, IEEE Communications Magazine, 44(4):122- 130, 2006.
[5] Du,W.; Deng,J.; Han,Y.S.; Varshney,P.K.; Katz,J.; Khalili,A.; A pairwise key predistributionscheme for wireless sensor networks, ACM Trans. on Information and System Security,8(2):228-258, 2005.
[6] Jen Yan Huang; I-En Liao; Hao-Wen Tang; A Forward Authentication Key ManagementScheme for Heterogeneous Sensor Networks, EURASIP J. on Wireless Communications andNetworking, Article ID 296704, DOI:10.1155/2011/296704, 2011.
[7] Eschenauer,L.; Gligor,V.D.(2002); A key-management scheme for distributed sensor networks,Proc. of the 9th ACM Conference on Computer and Communications Security, Washington,DC, USA, 41-47, 2002.
[8] Chan,H.; Perrig,A.; Song, D.; Randomkeypredistribution schemes for sensor networks, Proc.of IEEE Symposium on Security And Privacy, 197-213, 2003.
[9] Liu,D.; Ning, P.; Establishing pairwise keys in distributed sensor networks,Proc. of the 10thACM Conference on Computer and Communications Security (CCS 03), Washington, DC,USA, 52-61, 2003.
[10] Sencun Zhu; SanjeevSetia; SushilJajodia (2003); LEAP: Efficient Security Mechanisms forLarge Scale Distributed Sensor Networks, Proc. of the 10th ACM Conference on Computerand Communications Security, pp.62-72.

Keywords-
Our proposed result gives more efficient results than traditional approaches.