DocumentCode :
2038299
Title :
Securing wireless sensor network using deployment knowledge based key predistribution
Author :
Cherlyflar, L. ; Kishore, R. ; Radha, S
Author_Institution :
Dept. of Electron. & Commun. Eng., SSN Coll. of Eng., Chennai, India
Volume :
3
fYear :
2011
fDate :
8-10 April 2011
Firstpage :
391
Lastpage :
395
Abstract :
Wireless Sensor Networks are limited in their energy, computation and communication capabilities. In contrast to traditional networks, sensor nodes are often deployed in inaccessible areas, presenting a risk of physical attacks. A secured system can be achieved only if the security is integrated into each and every component. Otherwise the unsecured components become a point of attack. Thus security and privacy plays a major role in the aspect of system design. Key predistribution is found to be a better choice for resource constrained environments like wireless sensor networks. Another significant information regarding network is the deployment knowledge which can be used to improve the performance of the key predistribution schemes. Some information on deployment knowledge is achievable if deployment follows a particular order. Deployment knowledge offers numerous advantages when used in networks such as achieving better storage, better resilience to node capture, minimizing the number of keys and reduce network overhead. All the deployment knowledge based schemes available are based on the basic scheme and the key generation is based on Vander monde matrix. The main objective of this work is to propose a new scheme where keys are generated using Elliptic Curve Cryptography and by making use of deployment knowledge, the resilience and connectivity will be improved further.
Keywords :
public key cryptography; telecommunication security; wireless sensor networks; Vander monde matrix; deployment knowledge; elliptic curve cryptography; key generation; key predistribution; network overhead; node capture; physical attacks; sensor nodes; telecommunication security; wireless sensor network; Elliptic curve cryptography; Elliptic curves; Knowledge engineering; Mathematical model; Resilience; Wireless sensor networks; elliptic curve cryptography; elliptic curve points; key predistribution deployment knowledge; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4244-8678-6
Electronic_ISBN :
978-1-4244-8679-3
Type :
conf
DOI :
10.1109/ICECTECH.2011.5941778
Filename :
5941778
Link To Document :
بازگشت