CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Improving Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Networks using Collision-Keys

by Vijay Kumar, Priyanka Ahlawat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 23
Year of Publication: 2013
Authors: Vijay Kumar, Priyanka Ahlawat
10.5120/12211-8361

Vijay Kumar, Priyanka Ahlawat . Improving Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Networks using Collision-Keys. International Journal of Computer Applications. 70, 23 ( May 2013), 40-44. DOI=10.5120/12211-8361

@article{ 10.5120/12211-8361,
author = { Vijay Kumar, Priyanka Ahlawat },
title = { Improving Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Networks using Collision-Keys },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 23 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 40-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number23/12211-8361/ },
doi = { 10.5120/12211-8361 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:40.502591+05:30
%A Vijay Kumar
%A Priyanka Ahlawat
%T Improving Key Management Scheme Supporting Node Mobility in Heterogeneous Sensor Networks using Collision-Keys
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 23
%P 40-44
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks (WSNs) consist of a large number of sensor nodes that are batteries powered, equipped with limited memory and computational capabilities. These constrained devices face many security threats and thus there is a need of some cryptographic mechanism for secure communication. Key distribution is of critical importance to provide security in WSNs. Till now a number of key distribution schemes are proposed in the literature but there are very few schemes considering mobility of sensor nodes. In this paper we have proposed a modification to the key management scheme supporting node mobility in heterogeneous sensor network. Our modification uses Hash collision keys to improve the network resilience and connectivity between the nodes. We have evaluated our scheme analytically and obtained results show that our proposed solution assures better network connectivity and resilience while increasing an insignificant computational overhead.

References
  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci "Wireless Sensor Networks: a survey," Computer networks 38(4):393-422, 2002
  2. H. Zhao, J. Hu, J. Qin, V. Varadharajan and H. Wan, "Hashed Random Key Pre-Distribution Scheme for Large Heterogeneous Sensor Networks," IEEE 11th Inter. Conf. on Trust, Security and Privacy in Computing and Communications, 2012.
  3. A. K. Das, "Improving identity-based Random key Establishment Scheme for large scale hierarchical Wireless Sensor Networks," International Journal of Network Security 13 (3):181-201, 2011.
  4. S. U. Khan, L. Lavagno and C. Pastrone, "A key management scheme supporting node mobility in Heterogeneous Sensor Networks," IEEE 6th inter. Conf. on Emerging Technologies (ICET), 2010.
  5. Jiri Kur, Vashek Matyas and P. Svenda, "Two Improvements of Random Key Predistribution for Wireless Sensor Networks," in Proceedings of the 8th International Conference on Security and Privacy in Communication Networks, SecureComm 2012.
  6. M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu and S. Singh, "Exploiting the heterogeneity in sensor networks", INFOCOM'05,2005.
  7. L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. ACM Conf. Computer and Communication Security, pp: 41–47, 2002.
  8. H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P'03), 2003.
  9. S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach," in Proc. IEEE ICNP, 2003.
  10. X. Du, F. Lin, "Maintaining differentiated coverage in Heterogeneous sensor networks", EURASIP Journal on Wireless Communication and Networking, (4):565-572, 2005.
  11. P. Traynor, R. Kumar, H. Bin Saad, G. Cao, T. La Porta, "Efficient hybrid security mechanism for heterogeneous sensor networks," IEEE Trans. On Mobile Computing 6(6):663-677,2007.
  12. L. Girod et al, "A system for simulation, emulation and deployment of heterogeneous sensor networks", in Proceedings of ACM SenSys, 2004.
  13. A. S. Poornima, B. B. Amberker, "Tree-based Key Management Scheme for Heterogeneous Sensor Networks". 16th IEEE inter. Conference on Networks, 2008.
  14. W. T. Zhu, J. Zhou, R. H. Deng, F. Bao, "Detecting node Replication attacks in wireless sensor networks: A Survey," Journal of Network and Computer Applications: 1022-1034, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSN) Heterogeneous sensor network Resiliency Auxiliary Node (AN) Mobile node Key management