• DocumentCode
    228561
  • Title

    DIST-LEACH: A deterministic key management scheme for securing cluster-based sensor networks

  • Author

    Barad, Jaydeep ; Kadhiwala, Bintu

  • Author_Institution
    Comput. Eng. Dept., Sarvajanik Coll. of Eng. & Technol., Surat, India
  • fYear
    2014
  • fDate
    1-2 Aug. 2014
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Key management is very important for secure communication through encrypting messages in WSN As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. Because of the limited resources available for sensor nodes in WSN we must have efficient key management technique which also provides high security. For the same, LEACH, cluster based protocol for sensor networks, achieves energy efficient and scalable routing. Whereas storage issue in sensor network, can be reduced by using deterministic key management scheme. In this context, from all the different key management schemes in WSNs, deterministic key management scheme with LEACH, called DKS-LEACH is the scheme which is used to secure wireless sensor network in efficient manner and provides authentication, confidentiality and integrity of sensed data. Still there are some issues with DKS-LEACH like energy consumption and resilience against node capture. So we have proposed the scheme DIST-LEACH to improve the existing scheme to make it more resilient using distance based key management scheme. Even to make it energy efficient, one can modify the existing method to stop sending fake messages to BS. Thus proposed approach deals with inside as well as outside malicious nodes. The result clearly indicates that our scheme doesn´t increases energy consumption but at a same time provides batter security against the malicious node.
  • Keywords
    cryptography; data integrity; energy consumption; message authentication; routing protocols; telecommunication power management; telecommunication security; wireless sensor networks; DIST-LEACH; DKS-LEACH; WSN; authentication; cluster based protocol; cluster-based sensor networks; deterministic key management scheme; distance based key management scheme; energy consumption; energy efficient routing; fake messages; hostile environment; malicious nodes; message encryption; network attacks; node capture; remote environment; scalable routing; secure communication; security; sensed data confidentiality; sensed data integrity; sensor nodes; wireless sensor networks; Cryptography; Resilience; Wireless sensor networks; Cluster; Key management; Security; Wireless Sensor network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advances in Engineering and Technology Research (ICAETR), 2014 International Conference on
  • Conference_Location
    Unnao
  • ISSN
    2347-9337
  • Type

    conf

  • DOI
    10.1109/ICAETR.2014.7012949
  • Filename
    7012949