CFP last date
20 December 2024
Reseach Article

Key Management for Wireless Sensor Network Security

by Gaith A. Muslim, Ra'ad A. Muhajjar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 3
Year of Publication: 2022
Authors: Gaith A. Muslim, Ra'ad A. Muhajjar
10.5120/ijca2022921985

Gaith A. Muslim, Ra'ad A. Muhajjar . Key Management for Wireless Sensor Network Security. International Journal of Computer Applications. 184, 3 ( Mar 2022), 4-8. DOI=10.5120/ijca2022921985

@article{ 10.5120/ijca2022921985,
author = { Gaith A. Muslim, Ra'ad A. Muhajjar },
title = { Key Management for Wireless Sensor Network Security },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2022 },
volume = { 184 },
number = { 3 },
month = { Mar },
year = { 2022 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number3/32311-2022921985/ },
doi = { 10.5120/ijca2022921985 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:30.620845+05:30
%A Gaith A. Muslim
%A Ra'ad A. Muhajjar
%T Key Management for Wireless Sensor Network Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 3
%P 4-8
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most applications use wireless sensor networks (WSNs) to collect data, which are considered low-cost solutions to a variety of real-world problems. Sensors are small gadget that performs a certain function when deployed in the goal environment. Due to the nature of the channel transport wireless and limited the resource of sensors. Security issues have become a critical challenge in WSNs. The information is critical so securing it is property cannot be dispensed in wireless sensor networks. In this paper, security schemes have been proposed for securing hierarchical WSNs. The proposed scheme used a lightweight symmetric cryptographic technique that depends on a BLOOM hierarchal scheme and Pseudo-Random Number Generator (PRNG) to establish keys. The suggested method has a high level of security and makes efficient use of sensor resources.

References
  1. Al-Karaki, Jamal N., et.al. 2004, "Routing techniques in wireless sensor networks: a survey”. https://homepages.dcc.ufmg.br/~loureiro/alg/092/Eduardo_RoutingTechniquesInWSNs. DOI: 1536-1284/04/$20.00 © 2004 IEEE
  2. Akyildiz, W. Su, et.al. 2002, “A survey on sensor networks,” Communications Magazine, https://www.ics.uci.edu/~dsm/ics280sensor/readings/intro/akyildiz2.pdf. DOI: 0163-6804/02/$17.00 © 2002 IEEE
  3. Thiemo Voigt, Adam Dunkels, et.al. 2004, "Solar-aware clustering in Wireless Sensor Networks".http://citeseerx.ist.psu.edu/viewdoc/download. DOI:10.1.1.64.7959&rep=rep1&type=pdf
  4. K. Pavai, A. Sivagami, et.al.2009, “Study of Routing Protocols in Wireless Sensor Networks”.https://ieeexplore.ieee.org/abstract/document/5376523.DOI: 10.1109/ACT.2009.133
  5. H.-C. Shih, J.-H. Ho, B.-Y. Liao, et.al. 2013, “Hierarchical gradient diffusion algorithm for Wireless Sensor Networks,” in Recent Trends in Applied Artificial Intelligence, pp.https://link.springer.com/chapter/10.1007/978-3-642-38577-3_49.DOI: 10.1007/978-3-642-38577-3_49.
  6. Lein Harn, Sejun Song, et.al. 2019, "Hierarchical Key Management Scheme with Probabilistic Security In a Wireless Sensor Network (WSN)” https://pdfs.semanticscholar.org/6a25/3c706e74f1dcb1a45b04a046e0ff2f5bb2bd.pdf?DOI: 10.1155/2019/3950129.
  7. Lein Harn, Sejun Song, et.al. 2017, “( Security in Wireless Sensor Networks ) ” https://www.researchgate.net/publication/312531334_Wireless_Sensor_Network_Security. DOI: 10.13140/RG.2.2.16684.87682.
  8. Dr. Jidong Wang, et.al, 2015, “An Efficient Key Management Scheme in HierarchicalWireless Sensor Networks” https://sci-hub.se/https://doi.org/10.1109/CCCS.2015.7374122. DOI= 10.1109/CCCS.2015.7374122.
  9. P. Raghu Vamsi, Krishna Kant, 2015," A Taxonomy of Key Management Schemes of Wireless Sensor Networks” Fifth International Conference on Advanced.https://sci-hub.se/https://doi.org/10.1109/ACCT.2015.109.DOI: 10.1109/ACCT.2015.109.
  10. Mohammed A., Ra’ad A. Muhajjar, 2018,” Symmetric Key Management Scheme For Hierarchical Wireless Sensor Networks”, International Journal of Network Security & Its Applications (IJNSA) Vol. 10, No.3.https://zenodo.org/record/1263077#.YgUpKN9BxPY.DOI: 10.5121/ijnsa.2018.10302. 17.
  11. Raad A. Muhajjar. 2009,” SecuringWireless Hotspot Networks”, Ph.D. Thesis, Jamia Millia Islamia, India.https://www.researchgate.net/publication/311858271_Securing_Wireless_Hotspot_Networks.DOI: 10.13140/RG.2.2.33302.55366
  12. Siddiq Iqbal, Prerana.S, et.al. 2019,” Attack Resistant Secure Key Management in Wireless Sensor Networks”, International Conference on Advances in Information Technology.https://ieeexplore.ieee.org/document/8987362.DOI: 10.1109/ICAIT47043.2019.8987362.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSN) Hierarchical wireless sensor networks cluster-head (CH) security Leach Protocol key management pseudo-random number generator (PRNG) rivets cipher (RC5)