Title :
Improvement of deterministic key management scheme for securing cluster-based sensor networks
Author :
Barad, Jaydeep ; Kadhiwala, Bintu
Author_Institution :
Comput. Eng. Dept., Sarvajanik Coll. of Eng. & Technol., Surat, India
Abstract :
As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. So adaptation of dynamic key is very important for secure key management, for encrypting messages for communication.Because of the limitations of WSN like limited memory, battery life and processing power, use of cluster-based wireless sensor network reduces system delay and energy consumption. For the same, LEACH, cluster based protocol for sensor networks, achieves energy efficient and scalable routing. Whereas storage issue in sensor network, can be reduced by using deterministic key management scheme. In this context, from all the different key management schemes in WSNs, deterministic key management scheme with LEACH, called DKS-LEACH is the scheme which is used to secure wireless sensor network in efficient manner and provides authentication, confidentiality and integrity of sensed data. Still energy consumption and resilience against node capture is an issue with DKS-LEACH. So we proposed the scheme RINGLEACH to improve the existing scheme to make it more resilient using distance based key management scheme. Even to make it energy efficient, one can modify the existing method to stop sending fake messages to BS. Thus proposed approach deals with inside as well as outside malicious nodes. The result clearly indicates that our scheme doesn´t increases energy consumption but at a same time provides batter security against the malicious node.
Keywords :
cryptography; energy conservation; routing protocols; telecommunication power management; telecommunication security; wireless sensor networks; BS; DKS-LEACH; RINGLEACH; WSN; base station; battery life; cluster based protocol; cluster-based wireless sensor network; deterministic key management scheme; distance based key management scheme; energy consumption; energy efficient routing; node capture; processing power; scalable routing; sensor nodes; system delay; Authentication; Computers; Energy consumption; Protocols; Resilience; Wireless sensor networks; Cluster; Key management; Security; Wireless Sensor network;
Conference_Titel :
Networks & Soft Computing (ICNSC), 2014 First International Conference on
Conference_Location :
Guntur
Print_ISBN :
978-1-4799-3485-0
DOI :
10.1109/CNSC.2014.6906702