CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks

Published on December 2011 by Vijey Thayananthan, Ahmed Alzahrani
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 5
December 2011
Authors: Vijey Thayananthan, Ahmed Alzahrani
a90b6f86-59ac-4889-8488-e3ff77fc95bf

Vijey Thayananthan, Ahmed Alzahrani . Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks. Network Security and Cryptography. NSC, 5 (December 2011), 45-49.

@article{
author = { Vijey Thayananthan, Ahmed Alzahrani },
title = { Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 5 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 45-49 },
numpages = 5,
url = { /specialissues/nsc/number5/4442-spe031t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Vijey Thayananthan
%A Ahmed Alzahrani
%T Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 5
%P 45-49
%D 2011
%I International Journal of Computer Applications
Abstract

Key management and quantum cryptography (QC) are very interesting and challenging areas in wireless sensor networks (WSN). In order to make secure communications around WSN, communication between sensor nodes and base station to sensor node communication should be handled carefully. Today’s security around WSN needs efficient key management protocol and QC involved with quantum mathematical procedures and quantum physics [1]. According to the key management analysis, computational complexities of conventional and potential cryptography are very high. In order to avoid high complexity in key management, QC can be used because it is involved with quantum computation [4][5]. Quantum key distribution (QKD) is already established with laws of quantum mechanics influenced to quantum computations for some networks such as fiber optic, satellite based communication etc. Therefore, efficient approach of QC will be analyzed to manage the keys with maximum security and less complexity. Key management protocol [2][3] in wireless networks is influenced with authentication which uses symmetric or asymmetric cryptography. Authentication and entities in upper layers use public key cryptography [6].

References
  1. S. Fehr. Quantum Cryptography, Centrum Wiskunde & Informatica (CWI), Springer, Amsterdam, The Netherlands, 2010.
  2. Ali Fanian, Mehdi Berenjkoub and T. Aaron Gulliver. An Efficient Authentication and Key Management Protocol for Hierarchical Ad hoc Sensor Networks, WCNC 2009 proceedings, 2009.
  3. J. Jang, T. Kwon, and J. Song. A Time-Based Key Management Protocol for Wireless Sensor Networks, E. Dawson and D.S. Wong (Eds.): ISPEC 2007, LNCS 4464, pp. 314–328, 2007.
  4. Jason. Palmer, “Quantum computing device hints at powerful future”. Science and technology reporter, BBC News, Dallas. http://www.bbc.co.uk/news/science-environment-12811199, 2011.
  5. Vijey. Thayananthan, “Analysis of Quantum Computing and Trellis Coding based on PUM Codes”, International Journal of Computer Applications (IJCA), Vol. 30, No. 5, USA, Sept. 2011.
  6. Xu Huang, Shirantha Wijesekera and Dharmendra Sharma, Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network, University of Canberra, Australia 2008.
  7. Rakesh M. Verma y and Bailey E. Basile, Modeling and Analysis of LEAP, a Key Management Protocol for Wireless SensorNetworks, Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu Technical Report Number UH-CS-08-12, August 8, 2008.
  8. Q. Huang, H. Kobayashi, and B. Liu, “An unbalanced key establishment scheme for heterogeneous wireless networks,” Proc. IEEE Global Telecommun. Conf., pp. 2169-2174, Nov.-Dec. 2004.
  9. Sufyan T. Faraj, Integrating Quantum Cryptography Into SSL, Special Issue of Ubiquitous Computing Security Systems, UbiCC Journal - Volume 5, 2007.
  10. Mohammed A. Abuhelaleh and Khaled M. Elleithy, Security In Wireless Sensor Networks: Key Management Module In SOOAWSN. International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Key management QC Complexity WSN Authentication