Title :
DIST-LEACH: A deterministic key management scheme for securing cluster-based sensor networks
Author :
Barad, Jaydeep ; Kadhiwala, Bintu
Author_Institution :
Comput. Eng. Dept., Sarvajanik Coll. of Eng. & Technol., Surat, India
Abstract :
Key management is very important for secure communication through encrypting messages in WSN As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. Because of the limited resources available for sensor nodes in WSN we must have efficient key management technique which also provides high security. For the same, LEACH, cluster based protocol for sensor networks, achieves energy efficient and scalable routing. Whereas storage issue in sensor network, can be reduced by using deterministic key management scheme. In this context, from all the different key management schemes in WSNs, deterministic key management scheme with LEACH, called DKS-LEACH is the scheme which is used to secure wireless sensor network in efficient manner and provides authentication, confidentiality and integrity of sensed data. Still there are some issues with DKS-LEACH like energy consumption and resilience against node capture. So we have proposed the scheme DIST-LEACH to improve the existing scheme to make it more resilient using distance based key management scheme. Even to make it energy efficient, one can modify the existing method to stop sending fake messages to BS. Thus proposed approach deals with inside as well as outside malicious nodes. The result clearly indicates that our scheme doesn´t increases energy consumption but at a same time provides batter security against the malicious node.
Keywords :
cryptography; data integrity; energy consumption; message authentication; routing protocols; telecommunication power management; telecommunication security; wireless sensor networks; DIST-LEACH; DKS-LEACH; WSN; authentication; cluster based protocol; cluster-based sensor networks; deterministic key management scheme; distance based key management scheme; energy consumption; energy efficient routing; fake messages; hostile environment; malicious nodes; message encryption; network attacks; node capture; remote environment; scalable routing; secure communication; security; sensed data confidentiality; sensed data integrity; sensor nodes; wireless sensor networks; Cryptography; Resilience; Wireless sensor networks; Cluster; Key management; Security; Wireless Sensor network;
Conference_Titel :
Advances in Engineering and Technology Research (ICAETR), 2014 International Conference on
Conference_Location :
Unnao
DOI :
10.1109/ICAETR.2014.7012949