Wireless Sensor Network and Security Mechanism by Encryption (original) (raw)

A Key Management Technique to Secure Information Sharing of the Nodes within a Cluster of WSN.pdf

The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialise secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.

Key Management in Wireless Sensor Networks

Wireless and Mobile Network Security, 2009

Wireless sensor networks(WSNs) consist of a large number of low power nodes, with limited processing, communication, and storage resources. Large scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource constrained devices communicating via wireless links.The standard security requirements in WSNs include confidentiality, authentication and availability. These security requirements can be provided by encryption and authentication services which in turn demands a comprehensive key management scheme. The goal of key management is to pre-distribute cryptographic keys or keying materials among the nodes prior to the deployment, revoke keys if nodes leave the network, assign new keys to the nodes joining the network and periodically refreshing the keys. However, providing key management in WSNs is difficult due to the unknown network topology prior to deployment, intermittent connectivity and resource limitations of the sensor network environment.

Effective Key Management in Dynamic Wireless Sensor Networks

The problems of knowledge-based DYNAMIC wireless detector networks (WSNs), that change quality of detector nodes, facilitate wider network coverage and additional correct service than static WSNs. Therefore, dynamic WSNs area unit being apace adopted in observance applications, like target following in piece of land police work, tending systems, traffic flow and vehicle standing observance, cattle health observance [9]. However, detector de-vices area unit susceptible to malicious attacks like impersonation, interception, capture or physical destruction, as a result of their unattended operative environments and lapses of property in wireless communication [20]. Thus, security is one among the foremost vital problems in several vital dynamic WSN applications. Dynamic WSNs therefore ought to address key security necessities, like node authentication, information confidentiality and integrity, whenever and where the nodes move.

Key Management Techniques in Wireless Sensor Networks

International Journal of Network Security & Its Applications, 2014

Wireless sensor networks are visualized in military, medicinal services applications and business, where the data at these filed is very important. Security of the information in the system relies on the cryptographic strategy and the techniques in which encryption and decryption keys are built up among the nodes. Dealing with the keys in the system incorporates node validation, key understanding and key refresh stages which represents an extra overhead on system assets. Both Symmetric and Asymmetric key methods when connected independently in WSN neglects to give a design reasonable to extensive variety of utilizations.

Key management issues in wireless sensor networks: current proposals and future developments

IEEE Wireless Communications, 2007

Before a WSN can exchange data securely, encryption keys must be established among sensor nodes. Key distribution refers to the distribution of multiple keys among the sensor nodes, which is typical in a non-trivial security scheme. Key management is a broader term for key distribution, which also includes the processes of key setup, the initial distribution of keys, and key revocation-the removal of a compromised key.

Key propagation in wireless sensor networks

Available online xxxx a b s t r a c t With reference to a network consisting of sensor nodes connected by wireless links, we approach the problem of the distribution of the cryptographic keys. We present a solution based on communication channels connecting sequences of adjacent nodes. All the nodes in a channel share the same key. This result is obtained by propagating the key connecting the first two nodes to all the other nodes in the channel. The key propagation mechanism is also used for key replacement, as is required, for instance, in group communication to support forms of forward and backward secrecy, when a node leaves a group or a new node is added to an existing group.

A Review on Key Management Scheme for Wireless Sensor Networks

2015

Wireless sensor networks are distributed wireless multi-hop networks of tiny low-cost and low-performance devices called nodes or motes. They are used to monitor some physical phenomenon, such as humidity, temperature, pressure, movement, light and so on, and to communicate measured data. They are often deployed in previously unknown and physically unsecured environments. The requirements on processing speed, memory, communication, lifetime of a node and security differ for each application and thus leave different amount of resources to provide security with. However, most cryptographic solutions, both symmetric and asymmetric, are based on some secret keys. Consequently, these keys are established and managed by a key management scheme (KMS). Based on the application, specific restrictions and relaxations are made on KMS. In this paper, study of a specific type of KMS has been done.

Advance Key Management Approach for Security in WSN

Wireless Sensor Network has higher count of tiny sensor nodes in network. To perform the operations such as data transfer, communications, token transfer etc. at each node requires energy. With study of various research work for secure communication between Ch to Node and Ch to BS, we founded Certificate-Less Effective Key Management (CLEKM) protocol has better energy effective and secure routing. There are main four keys are discussed, the Cluster Head (CH) which has cluster key for the purpose of forwards message's inside the cluster. Pair-wise key shares the key to every node present in neighbor. The collected information is forwarded securely to base station by making use of individual key. When asymmetric schemes are used, maintenance of keys is easier, but they provide a lesser degree of security when compared to symmetric encryption schemes. In order to cope up with these shortcomings, we propose to use an improved version of the hybrid encryption scheme, which is a combination of Advanced Encryption Standard (AES) and Elliptical Curve Cryptography (ECC) with cross encrypted keys for secure key exchange and node authentication and hybrid encryption for enhanced cipher-text security.

AKey RE-DISTRIBUTION AND AUTHENTICATION BASED TECHNIQUE FOR SECURED COMMUNICATION IN CLUSTERED WIRELESS SENSOR …

Citeseer

Due to application of WSN in mission critical areas, secured message communication is very important. We have attempted to present a methodology that ensures secured communication among nodes in a hierarchical Cluster Based WSN. Our scheme works when member sensor nodes move from one Cluster Head (CH) to another. The proposed scheme is based on Key Redistribution during node mobility and development of an Authentication Model to check whether the new node in a cluster is an intruder. We have carried out extensive simulation experiments, which demonstrate the efficacy of the proposed scheme. The experiments suggest that the number of message transmission in creases linearly with the number of mobile nodes during key-redistribution when a node moves from one CH to another. We have seen that the detection efficiency of the Authentication Model is 0.9 to 1 when tunable threshold value is 0.02 and sensor nodes are sufficiently mobile. 105 resources and may even be tamper resistant. The Member nodes have less resource and are riskprone. We have used this hierarchical architecture in our paper.

Security in Wireless Sensor Network using Stationary Access Nodes

Wireless Sensor networks (WSNs) are easy to deploy and allow flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security for WSNs is very much needed, because of its sensitive information transmission. Sensor networks are vulnerable to many types of attacks because they are deployed in public environment. So it is necessary to secure sensor networks, this can be achieved by introducing authentication and pair wise key establishment mechanisms to sensor nodes. In the proposed system some nodes in WSN are selected as stationary access nodes (SANs) to provide authentication access point between mobile sinks and static sensor nodes. The key distribution mechanism uses two types of key pools: the mobile key pool and the static key pool, the keys in the mobile key pool are shared between mobile sinks and SANs the keys in the static key pool are shared between Sans and Static sensor nodes.