DocumentCode
228561
Title
DIST-LEACH: A deterministic key management scheme for securing cluster-based sensor networks
Author
Barad, Jaydeep ; Kadhiwala, Bintu
Author_Institution
Comput. Eng. Dept., Sarvajanik Coll. of Eng. & Technol., Surat, India
fYear
2014
fDate
1-2 Aug. 2014
Firstpage
1
Lastpage
5
Abstract
Key management is very important for secure communication through encrypting messages in WSN As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. Because of the limited resources available for sensor nodes in WSN we must have efficient key management technique which also provides high security. For the same, LEACH, cluster based protocol for sensor networks, achieves energy efficient and scalable routing. Whereas storage issue in sensor network, can be reduced by using deterministic key management scheme. In this context, from all the different key management schemes in WSNs, deterministic key management scheme with LEACH, called DKS-LEACH is the scheme which is used to secure wireless sensor network in efficient manner and provides authentication, confidentiality and integrity of sensed data. Still there are some issues with DKS-LEACH like energy consumption and resilience against node capture. So we have proposed the scheme DIST-LEACH to improve the existing scheme to make it more resilient using distance based key management scheme. Even to make it energy efficient, one can modify the existing method to stop sending fake messages to BS. Thus proposed approach deals with inside as well as outside malicious nodes. The result clearly indicates that our scheme doesn´t increases energy consumption but at a same time provides batter security against the malicious node.
Keywords
cryptography; data integrity; energy consumption; message authentication; routing protocols; telecommunication power management; telecommunication security; wireless sensor networks; DIST-LEACH; DKS-LEACH; WSN; authentication; cluster based protocol; cluster-based sensor networks; deterministic key management scheme; distance based key management scheme; energy consumption; energy efficient routing; fake messages; hostile environment; malicious nodes; message encryption; network attacks; node capture; remote environment; scalable routing; secure communication; security; sensed data confidentiality; sensed data integrity; sensor nodes; wireless sensor networks; Cryptography; Resilience; Wireless sensor networks; Cluster; Key management; Security; Wireless Sensor network;
fLanguage
English
Publisher
ieee
Conference_Titel
Advances in Engineering and Technology Research (ICAETR), 2014 International Conference on
Conference_Location
Unnao
ISSN
2347-9337
Type
conf
DOI
10.1109/ICAETR.2014.7012949
Filename
7012949
Link To Document