Full Paper View Go Back

Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network

Sanchita Gupta1 , Pooja Saini2

Section:Research Paper, Product Type: Journal
Vol.1 , Issue.2 , pp.21-23, Jun-2013

Online published on Jun 30, 2013


Copyright © Sanchita Gupta , Pooja Saini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sanchita Gupta , Pooja Saini, “Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.21-23, 2013.

MLA Style Citation: Sanchita Gupta , Pooja Saini "Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network." International Journal of Scientific Research in Network Security and Communication 1.2 (2013): 21-23.

APA Style Citation: Sanchita Gupta , Pooja Saini, (2013). Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network. International Journal of Scientific Research in Network Security and Communication, 1(2), 21-23.

BibTex Style Citation:
@article{Gupta_2013,
author = {Sanchita Gupta , Pooja Saini},
title = {Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2013},
volume = {1},
Issue = {2},
month = {6},
year = {2013},
issn = {2347-2693},
pages = {21-23},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=48},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=48
TI - Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Sanchita Gupta , Pooja Saini
PY - 2013
DA - 2013/06/30
PB - IJCSE, Indore, INDIA
SP - 21-23
IS - 2
VL - 1
SN - 2347-2693
ER -

5118 Views    4306 Downloads    4282 Downloads
  
  

Abstract :
To achieve security in wireless sensor networks it is important to be able to encrypt the messages sent among the sensor nodes. Keys for encryption and authentication purpose must be agreed upon by communicating nodes. Due to the resource constraint (limited memory size), achieving such key agreement in wireless sensor network is extremely difficult. Many key agreement schemes used in general networks, such as Diffie-Hellman and public key based schemes, are not suitable for wireless sensor networks. Pre-distribution of secret key for all the pair of nodes is not possible due to the large amount of memory is used when network size is large. In this paper, we provide a view of pairwise key pre-distribution scheme and the deployment knowledge; and also describe the pairwise key pre-distribution scheme with deployment knowledge as an improvement. Deployment knowledge avoids the unnecessary key assignments and improves the performance of the sensor networks in terms of memory usage.

Key-Words / Index Term :
Wireless sensor networks, Pairwise key pre-distribution scheme, Deployment knowledge and security

References :
[1] N. Sugathi et al. “Secure key management for dynamic sensor networks”, International journal of wireless communications and networking, vol. 3, no. 1, 2011, pp. 83-88.
[2] W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge”, in Proceedings of IEEE INFOCOM 2004, pages 586-597, 2004.
[3] Wenliang Du et al. “A pairwise key pre-distribution scheme for wireless sensor networks”, ACM transactions, October, 2003.
[4] H. Chan, A. Perrig, and D. Song., “Random key pre-distribution schemes for sensor networks”, in IEEE Symposium on Security and Privacy, Pages 197-213, Berkeley, California, May 11-14 2003.
[5] D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks”, in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31 2003, pp. 52–61.
[6] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. “A survey on sensor networks”, IEEE Communications Magazine, 40(8):102–114, August 2002.
[7] L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, in Proceedings of the 9th ACM conference on Computer and communications security, November 2002.
[8] R. Lidl and H. Niederreiter, Finite Fields, Cambridge University Press, Cambridge, 1996.
[9] B. C. Neuman and T. Tso, “Kerberos: An authentication service for computer networks”, IEEE Communications, vol. 32, no. 9, pp.33-38, September 1994.
[10] W. Diffie and M. E. Helllman, “New directions in cryptography”, IEEE Transactions on Information Theory, vol. 22, pp. 644-654, November 1976.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation