CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Hash Chain based Key Management for Mobile Heterogeneous Sensor Network

by Vipin Kumar, Priyanka Ahlawat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 23
Year of Publication: 2013
Authors: Vipin Kumar, Priyanka Ahlawat
10.5120/12113-8402

Vipin Kumar, Priyanka Ahlawat . Hash Chain based Key Management for Mobile Heterogeneous Sensor Network. International Journal of Computer Applications. 69, 23 ( May 2013), 33-36. DOI=10.5120/12113-8402

@article{ 10.5120/12113-8402,
author = { Vipin Kumar, Priyanka Ahlawat },
title = { Hash Chain based Key Management for Mobile Heterogeneous Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 23 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number23/12113-8402/ },
doi = { 10.5120/12113-8402 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:08.301572+05:30
%A Vipin Kumar
%A Priyanka Ahlawat
%T Hash Chain based Key Management for Mobile Heterogeneous Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 23
%P 33-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Key management is an important issue for wireless sensor networks because sensors have limited resources as memory, processing speed and battery power. Key management is one of the basic building blocks of sensor network security. Many protocol presented before didn’t take much attention on mobility of node. In this paper, we proposed Hass Chain based key management scheme for Heterogeneous networks where Base Station and cluster head are fixed and other node moving around these heads. Compare to other basic key management scheme, proposed scheme increase resilience against node capture as well as consider memory limitations.

References
  1. Bowman, M. , Debray, S. K. , and Peterson, L. L. 1993. Reasoning about naming systems.
  2. P. Samundiswary, Padma priyadarshini, P. Dananjayan, Performance evaluation of heterogeneous sensor networks, Proc. 2009 Int. Conf. on Future Computer and Communication (ICFCC 2009), Kuala Lumpar, Malaysia, April, 2009, 264-267
  3. L. Eschenauer, V. D. Gligor, A key-management scheme for distributed sensor networks, Proc. Of the 9th ACM Conf. on Computer and Communications Security, Washington, DC, United States, Nov. 2002, 41-47
  4. H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, Proc. IEEE Symposium on Research in Security and Privacy, Berkeley, CA, United States, May 2003, 197-213
  5. C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, Perfectly-secure key distribution for dynamic conferences, Proc. of the 12th Annual Int. Cryptology Conf. on Advances in Cryptology, California, USA, 1992, 471-486
  6. D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, Proc. of the 10th ACM Conf. on Computer and Communications Security, CCS 2003, Washington, DC, United States, Oct. 2003, 52-61
  7. Kejie Lu, Yi Qian, Mohsen Guizani, Hsiao-Hwa Chen, A framework for a distributed key management schemes in heterogeneous wireless sensor networks, IEEE Transactions on Wireless Communications, 2(7), 2008, 639-647
  8. Xiaojiang Du, Yang Xiao, Song Ci, Mohsen Guizani, Hsiao-Hwa Chen, A routing-driven key management scheme for heterogeneous sensor networks, Proc. 2007 IEEE Int. Conf. on Communications, ICC'07, Glasgow, Scotland, United kingdom, June 2007, 3407-3412
  9. F. Kausar, M. Q. Saeed, A. Masood, Key management and secure routing in heterogeneous sensor networks, Proc. 4th IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communication, WiMob 2008, Avignon, France, Oct. 2008, 549-554
  10. Sarmad Ullah khan,Luciano A key Management scheme Supporting Node Mobility in Hetrogeneous Sensor Network
  11. P. Traynor, R. Kumar, H. BinSaad ,G. Cao, T, La Porta "Efficient hybrid security machanisms for heterogeneous sensor network", IEEE Trans. On mobile Computing 6(6): 633-677, 2007
  12. Jiri Kur, Vashek Matyas, Petr Svenda "Two Improvement of Random Key Predistribution for Wireless Sensor Networks-Revised Version" Journal of Latex Class Files. Vol 6 no 1, January 2007
Index Terms

Computer Science
Information Sciences

Keywords

Heterogeneous wireless sensor network key management random key predistribution hash chain