A Distributed Key Management Protocol for Wireless Sensor Network

In sensor network where large group of nodes share the information, in such scenario it’s difficult to scale the application, in addition security in wireless sensor network often vary with purpose and context, but in broad-spectrum, security for wireless sensor networks should centered on the protection of the data itself and the network communications between the nodes. Privacy, reliability and validation are the most important data security concerns. Traditional cryptographic methods are not promising on resource limited sensor nodes. Node initiated key management is a novel idea where rather than base station or key distribution center initiate the security algorithm. We can give control to sensor nodes or cluster head for securing communicating nodes with in a sensor network. It is a non centralized key management method which is more robust than other methods. in this paper we proposed the proactive key management which guarantee efficiency, robustness, and dynamic clustering.

[1]  Dawn Song,et al.  Key distribution techniques for sensor networks , 2004 .

[2]  Sunil Taruna,et al.  Improved Key Distribution and Management in Wireless Sensor Network , 2016 .

[3]  Baojiang Cui,et al.  Enhanced Key Management Protocols for Wireless Sensor Networks , 2015, Mob. Inf. Syst..

[4]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[5]  Victor C. M. Leung,et al.  Key management issues in wireless sensor networks: current proposals and future developments , 2007, IEEE Wireless Communications.

[6]  Reza Azarderakhsh,et al.  A Key Management Scheme for Cluster Based Wireless Sensor Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[7]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[8]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[9]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[10]  Pritam Gajkumar Shah,et al.  Fast algorithm in ECC for wireless sensor network , 2010 .

[11]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[12]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[13]  Tuvi Etzion,et al.  Efficient Key Predistribution for Grid-Based Wireless Sensor Networks , 2008, ICITS.

[14]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[15]  Dan Boneh,et al.  Bivariate Polynomials Modulo Composites and their Applications , 2014, IACR Cryptol. ePrint Arch..

[16]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[17]  Jie Cui,et al.  An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users , 2015, Mob. Inf. Syst..

[18]  Mohammad Reza Faghani,et al.  Sectorized Location Dependent Key Management , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[19]  Yue Qi,et al.  An Efficient and Secure Key Management Scheme for Hierarchical Wireless Sensor Networks , 2012 .

[20]  Li Li,et al.  An Efficient Pairwise Key Predistribution Scheme for Wireless Sensor Networks , 2014, J. Networks.

[21]  Jerome H. Saltzer,et al.  Section E.2.1 Kerberos Authentication and Authorization System , 1988 .