CFP last date
20 December 2024
Reseach Article

Key Management for Flat Wireless Sensor Network Security

by Gaith A. Muslim, Ra'ad A. Muhajjar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 16
Year of Publication: 2022
Authors: Gaith A. Muslim, Ra'ad A. Muhajjar
10.5120/ijca2022922166

Gaith A. Muslim, Ra'ad A. Muhajjar . Key Management for Flat Wireless Sensor Network Security. International Journal of Computer Applications. 184, 16 ( Jun 2022), 49-53. DOI=10.5120/ijca2022922166

@article{ 10.5120/ijca2022922166,
author = { Gaith A. Muslim, Ra'ad A. Muhajjar },
title = { Key Management for Flat Wireless Sensor Network Security },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2022 },
volume = { 184 },
number = { 16 },
month = { Jun },
year = { 2022 },
issn = { 0975-8887 },
pages = { 49-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number16/32406-2022922166/ },
doi = { 10.5120/ijca2022922166 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:21:38.439859+05:30
%A Gaith A. Muslim
%A Ra'ad A. Muhajjar
%T Key Management for Flat Wireless Sensor Network Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 16
%P 49-53
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most applications use wireless sensor networksto collect data, which are considered low-cost solutions to a variety of real-world problems. Numbers of sensor nodes are deployed in a goal environment for carrying out multiple tasks. Providing confidentiality and integrity to the transmitted information through efficient key management assists. Security issues have become a critical challenge in WSNs due to the nature of the channel transport wireless and limited the resource of sensors. In this paper, security schemes have been proposed for securing flat WSNs. The proposed scheme used a lightweight symmetric cryptographic technique that depends on a Pseudo-Random Number Generator (PRNG) to establish keys. The suggested method has a high level of security through achieving confidently in data, integrity, authentication, making efficient use of sensor resources, and providing perfect resistance to sensor node capture attacks.

References
  1. Al-Karaki, Jamal N., et.al. 2004, "Routing techniques in wireless sensor networks: a survey”. https://homepages.dcc.ufmg.br/~loureiro/alg/092/Eduardo_RoutingTechniquesInWSNs.DOI: 1536-1284/04/$20.00 © 2004 IEEE
  2. I. Akyildiz, W. Su, et.al. 2002, “A survey on sensor networks” Communications Magazine, https://www.ics.uci.edu/~dsm/ics280sensor/readings/intro/akyildiz2.pdf DOI: 0163-6804/02/$17.00 © 2002 IEEE
  3. Thiemo Voigt, Adam Dunkels, et.al.2004, "Solar-aware clustering in Wireless Sensor Networks". http://citeseerx.ist.psu.edu/viewdoc/download DOI: 10.1.1.64.7959&rep=rep1&type=pdf
  4. Sadaqat Ur Rehman, Muhammad Bilal, et.al.2012,"Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSNs)", International Journal of Computer Science,pp(96–101).https://www.scinapse.io/papers/1495968257.
  5. Llanos Tobarra, Diego Cazorla, et.al. 2007, "Formal Analysis of Sensor Network Encryption Protocol (SNEP)”IEEE International Conference on Mobile Adhoc and Sensor Systems.DOI:10.1109/MOBHOC.2007.4428763.
  6. Lein Harn, Sejun Song, et.al. 2017, “SecurityinWireless Sensor Networks” https://www.researchgate.net/publication/312531334_Wireless_Sensor_Network_Security. DOI: 10.13140/RG.2.2.16684.87682.
  7. Monika Bhalla, Nitin Pandey, et.al. 2015, “An Efficient Key Management Scheme in Hierarchical Wireless Sensor Networks”, International Conference on Green Computing and Internet of Things.https://cibtrc.com/wp-content/uploads/2019/12/bhalla2015.pdf DOI: 10.1109/ICGCIoT.2015.7380610
  8. P. Raghu Vamsi, Krishna Kant, 2015," A Taxonomy of Key Management Schemes of Wireless Sensor Networks” Fifth International Conference on Advanced. https://sci-hub.se/https://doi.org/10.1109/ACCT.2015.109. DOI: 10.1109/ACCT.2015.109
  9. Mohammed A., Ra’ad A. Muhajjar, 2018,” Symmetric Key Management Scheme For Hierarchical Wireless Sensor Networks”, International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.3. https://zenodo.org/record/1263077#.YgUpKN9BxPY. DOI: 10.5121/ijnsa.2018.10302. 17
  10. Raad A. Muhajjar. 2009,” Securing Wireless Hotspot Networks”, Ph.D. Thesis, Jamia Millia Islamia,India. https://www.researchgate.net/publication/311858271_Securing_Wireless_Hotspot_Networks. DOI: 10.13140/RG.2.2.33302.55366
  11. Adrian Perrig, Robert Szewczyk, et.al.  2002,” SPINS: Security Protocols for Sensor Networks”, (part SNEP) Wireless Networks, 8, pp (521–534). https://doi.org/10.1023/A:1016598314198. DOI: 10.1023/A:1016598314198.
  12. Monika Bhalla, Nitin Pandey, et.al.  2015,” Security Protocols for Wireless Sensor Networks”, (part SNEP) International Conference on Green Computing and Internet of Things. https://sci-hub.st/10.1109/ICGCIoT.2015.7380610. DOI: 978-1-4673-7910-6/15/$31.00.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSN) flat wireless sensor networks key management pseudo-random number generator (PRNG) rivets cipher5(RC5)