An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

Full Text (PDF, 1160KB), PP.56-64

Views: 0 Downloads: 0

Author(s)

Harjot Bawa 1,* Parminder Singh 1 Rakesh Kumar 2

1. Department of IT CEC, Landran

2. Department of CSE Sachdeva Engg. college for Girls, Kharar

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.01.07

Received: 2 Apr. 2012 / Revised: 5 Aug. 2012 / Accepted: 2 Oct. 2012 / Published: 8 Jan. 2013

Index Terms

Wireless Sensor Networks, Key Management Schemes, Random Pre-Key distribution

Abstract

The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among nodes and resilience against node capture, we propose a scheme called as Random Pre-Key distribution scheme which takes advantage of the binomial key pattern while creating and distributing keys. The value of keys would develop the number of patterns, which is given by the binomial distribution, which would be helpful in maintaining a key pool which is all though random in nature and following a pattern leads to more probability of network connection links. This paper provides a secured communication in WSNs environment and pairing user authentication has been proposed. We employ the idea of dividing the sensor network field into scattered nodes. Inside the scenario, one of the sensor nodes is selected as a server sensor node which is responsible for delivering the key. The novelty of the proposed scenario lies behind the idea of incorporating the sensor nodes along with the proper user authentications. We calculate the throughput involving a periodic traffic and obtained results from the xgraph utility with the use of Network Simulator. The results of this key scheme are obtained and show that improvement in terms of connectivity.

Cite This Paper

Harjot Bawa, Parminder Singh, Rakesh Kumar, "An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.1, pp.56-64, 2013. DOI:10.5815/ijcnis.2013.01.07

Reference

[1]I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,(2002) "Wireless sensor networks: a survey," in Computer Networks. vol. 38, pp. 393-422.
[2]http://www.worldscibooks.com/compsci/6288.html, "Information Processing and routing in Wireless Sensor Networks "© World Scientific Publishing Co. Pte. Ltd.
[3]Muhammad,S., et.al." A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks", Department of Computer Engineering Kyung Hee University (Global Campus), Korea.
[4]Wenliang Du,et.al "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.". Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244-1240, USA Email: {wedu, jdeng01, varshney}@ecs.syr.edu
[5]Mokhtar Aboelaze, Fadi Aloul,(2005) "Current and Future Trends in Sensor Networks: A Survey", IEEE.
[6]Mohamed F. Younis, Senior Member, IEEE, Kajaldeep Ghumman, and Mohamed Eltoweissy, Senior Member, IEEE. "Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks" .
[7]Dressler, F.(2008)"A Study of Self-Organization Mechanisms in Ad Hoc and Sensor Networks. Elsevier Computer Communications", vol. 31 (13), pp. 3018-3029.
[8]Ji Heon Kwon, "Improved Connectivity Using Hybrid Uni/Omni-directional Antennas In Sensor Networks", Department of Electrical and Computer Engineering Texas A&M University.
[9]Laurent Eschenauer and Virgil D. Gligor.(2002)A key-management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 41- 47, New York.
[10]Noor J. Ottallah (2008) "Implementation of Secure Key Management Techniques in Wireless Sensor Networks" , B.S University of New Orleans.
[11]Chi‐Yuan Chen, et.al.,(2011) "A survey of key distribution in wireless sensor networks", Security Comm. Networks Published online in Wiley Online Library.
[12]Chan H, Perrig A, Song D.(2003) "Random key pre- distribution schemes for sensor networks". In Proceedings of IEEE Symposium on Security and Privacy (S&P).
[13]Zhang W, Tran M, Zhu S, Cao G.(2007) A random perturbation‐based scheme for pair-wise key establishment in sensor networks. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), September 9–14, Montreal, QC, Canada.
[14]Ashok Kumar Das,(2009) " A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks", Journal Of Computers, Vol. 4, No. 9,.
[15]Shih-I Huang ,et.al, Department of Computer Science and Information Engineering National Chiao Tung University "Adaptive Random Key Distribution Scheme For Wireless Sensor Network".
[16]Mohit Saxena (2007), "Security In Wireless Sensor Networks -A Layer Based classification", Purdue University, West Lafayette, IN 47907-208
[17]Yun Zhou et.al (2006)." Access control in wireless sensor networks ",Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32611, United States Available online 5 July 2006.