We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

EEKWSN – Energy Efficient Key Distribution in Wireless Sensor Network

by Ambika. N, G. T. Raju
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 15
Year of Publication: 2014
Authors: Ambika. N, G. T. Raju
10.5120/16294-6166

Ambika. N, G. T. Raju . EEKWSN – Energy Efficient Key Distribution in Wireless Sensor Network. International Journal of Computer Applications. 93, 15 ( May 2014), 28-32. DOI=10.5120/16294-6166

@article{ 10.5120/16294-6166,
author = { Ambika. N, G. T. Raju },
title = { EEKWSN – Energy Efficient Key Distribution in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 15 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number15/16294-6166/ },
doi = { 10.5120/16294-6166 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:15:51.485630+05:30
%A Ambika. N
%A G. T. Raju
%T EEKWSN – Energy Efficient Key Distribution in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 15
%P 28-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network is a field which is spreading its wings into different application areas. Security is the primary concern as these nodes are deployed in unattended and harsh environment. Authentication and integrity of data becomes essential to monitor the network installed in remote areas. This paper generates group keys for every session to encrypt data. The technique minimizes 5. 5% of the energy consumption in the network compared to other traditional methods. Backward and forward secrecy is Sybil attack, sinkhole attack and wormhole attack are minimized are tackled in this work.

References
  1. William R. Claycomb , Dongwan Shin, "A novel node level security policy framework for wireless sensor networks", Journal of Network and Computer Applications 34 (2011), 418– 428.
  2. James Newsome , Elaine Shi, Dawn Song ,Adrian Perrig, "Detecting Sybil attacks in Wireless Sensor Networks using neighbouring information", Proceedings of the 3rd international symposium on Information processing in sensor networks, ACM New York, 2004.
  3. Misra. S, Myneni, S. ,"On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI",IEEE Global Telecommunications Conference, 2010.
  4. Yih-Chun Hu, Perrig, A. and Johnson, D. B, "Wormhole attacks in wireless networks ", IEEE Journal on Selected Areas in Communications, Volume: 24 Issue:2 ,370 – 380.
  5. Zhibin Zhao; Bo Wei, Xiaomei Dong, Lan Yao and Fuxiang Gao, "Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis ", WASE International Conference on Information Engineering (ICIE), 2010, 251 - 254.
  6. Liping Teng; Yongping Zhang, "SeRA: A Secure Routing Algorithm Against Sinkhole Attacks for Mobile Wireless Sensor Networks", Second International Conference on Computer Modelling and Simulation, 2010, 79 - 82.
  7. Changlong Chen, Song, Min, Hsieh and George, "Intrusion detection of sinkhole attacks in large scale wireless sensor networks", IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010 , 711 - 716.
  8. Denning, D. , "An Intrusion Detection Model", IEEE Transactions on Software Engineering, 1987, 13(2):222—232.
  9. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000.
  10. A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks", IEEE Wireless Communications, Feb 2004,vol. 11, no. 1, 48-60.
  11. Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," ACM MOBICOM, 2000.
  12. Abbasi, A. A. & Younis, M. , A survey on clustering algorithms for wireless sensor networks, Comput. Commun. , 2007, 30(14-15): 2826–2841.
  13. Djenouri, D. , Khelladi, L. & Badache, A. ,A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications Surveys Tutorials, 2005, 7(4): 2 – 28.
  14. Roman, R. , Applying intrusion detection systems to wireless sensor networks, in CCNC Proceeding of the 3rd IEEE Consumer Communications and Networking Conference, 2006, 640–644.
  15. Wang, Y. , Attebury, G. & Ramamurthy, B. , A survey of security issues in wireless sensor networks, IEEE Communications Surveys Tutorials, 2006. , 8(2): 2 –23.
  16. Eschenauer L, Gligor V, "A key management scheme for distributed sensor networks", In Proceedings of the Annual ACM Computer and Communications Security (CCS), 2002.
  17. Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge, In Proc. of the 24th IEEE Conference on Computer Communications (INFOCOM), 2004.
  18. Liu D, Ning P, Du W. Group based key pre-distribution for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Energy efficient algorithm group-based authentication key key distribution Markov chain