CFP last date
20 January 2025
Reseach Article

DYCRASEN: A Dynamic Cryptographic Asymmetric Key Management for Sensor Network using Hash Function

by D.Saravanan, D.Rajalakshmi, D.Maheswari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 18 - Number 8
Year of Publication: 2011
Authors: D.Saravanan, D.Rajalakshmi, D.Maheswari
10.5120/2308-2763

D.Saravanan, D.Rajalakshmi, D.Maheswari . DYCRASEN: A Dynamic Cryptographic Asymmetric Key Management for Sensor Network using Hash Function. International Journal of Computer Applications. 18, 8 ( March 2011), 1-3. DOI=10.5120/2308-2763

@article{ 10.5120/2308-2763,
author = { D.Saravanan, D.Rajalakshmi, D.Maheswari },
title = { DYCRASEN: A Dynamic Cryptographic Asymmetric Key Management for Sensor Network using Hash Function },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 18 },
number = { 8 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume18/number8/2308-2763/ },
doi = { 10.5120/2308-2763 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:41.762511+05:30
%A D.Saravanan
%A D.Rajalakshmi
%A D.Maheswari
%T DYCRASEN: A Dynamic Cryptographic Asymmetric Key Management for Sensor Network using Hash Function
%J International Journal of Computer Applications
%@ 0975-8887
%V 18
%N 8
%P 1-3
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In sensor networks security is an important issue. Mission critical networks show great potential in emergency response and recovery. It is challenging to design a key management scheme to fulfill the required attributes for secure communication. The Secure Group Communication (SGC) requires common network wide key for confidentiality of control messages and data reports. The group key should be updated when a node enters inoperative state. Each member of a group of users can compute a common key for secure communication. We define Asymmetric key pre-distribution scheme in terms of storage. The complex encryption and decryption operations are replaced by hash functions and simple AND operations. This proposed scheme minimize the storage computation and computation cost.

References
  1. C.Blundo and P.D’Arco, “The key establishment problem,”in foundations of security analysis and design FOSAD 2001-02, LNCS 2946. Springer-Verlag, 2004, pp.44-90.
  2. B.C.Neuman and T.Tso,”Kerberos: An Authentication service for computer networks”, IEEE communications, vol.32, no.9, pp.33-38, September 1994.
  3. S.A.Camtepe and B.Yener,” Combinatorial design of key distribution mechanisms for wireless sensor networks,” in Proc.9th Eur.Symp.Research in computer security,2004,pp.346-358.
  4. H.Chan, A.Perrig, and D.Song,”Random key pre distribution schemes for sensor networks,” in Proc.IEEE Symp.Research security privacy,2003,pp.197-213.
  5. J.Kong, P.Zerfos,H.Luo,S.Lu and L.Zhang,”Providing robust and ubiquitous security support for mobile ad-hoc networks,”in proc. 9th IEEE Int.Conf.Network Protocols,2001,pp.251-260.
  6. S.Capkun, L.Buttyan, and J.P.Hubaux,” Self- organized public-key management for mobile ad hoc networks,” IEEE Trans. Mobile comput., vol.2,no.1,pp.52-64, Jan/Mar. 2003
  7. B.Zhu, F.Bao, R.H.Deng, M.S.Kankanhalli, and G.Wang, “Efficient and robust key management for large mobile ad-hoc networks,” Comput.Netw.J.,vol.48,no.4,pp.657-682,Jul.2005.
  8. D.Boneh and M.Franklin,”Identity based encryption from the weil pairing,” SIAM J.Comput., vol.32,no.3,pp.586-615,2003
  9. I.Chang, R.Engel, D.Kandlur, D. Pendarakis and D.Daha. “Key management for secure internet multicast using Boolean function minimization technique”. ACM SIGCOMM’99, March 1999.
  10. N.F.P.180-1. Secure hash standard. Draft,NIST, May 1994.
  11. R.Rivest. The MD5 message-digest algorithm.RFC 1321,April 1992.
  12. A.S.Poornima, R.Aparna and B.B.Amberker, “storage and Rekeying cost for cumulative member removal in secure group communication”, International journal of computer science and network security, Vol.7 No.9 pp.212-218,2007
Index Terms

Computer Science
Information Sciences

Keywords

Key Management Sensor Network Hash Function Asymmetric Key