A real-time dynamic key management for hierarchical wireless multimedia sensor network

2012 ◽  
Vol 67 (1) ◽  
pp. 97-117 ◽  
Author(s):  
Yiying Zhang ◽  
Xiangzhen Li ◽  
Jucheng Yang ◽  
Yuanan Liu ◽  
Naixue Xiong ◽  
...  
Author(s):  
Sana Sarwat ◽  
Ayesha Tahir ◽  
Salman Afsar Awan ◽  
Mudassar Ahmed

Wireless Multimedia Sensor Network (WMSN) is a collection of the vast amount of different types of sensors like camera sensor, video and scalar sensors which are involved in retrieving multimedia data from the large environment. The real-time sending of video and audio content to the destination before a strict playout deadline has been necessary for multimedia environment. Otherwise, it will be dropped at the destination. In WMSN sending real time multimedia data with soft play deadlines is a challenging task to solve this challenge, routing protocols play an important role in WMSN. Routing demands of multimedia content of WMSNs need to be perfect routing protocols to optimize path selection and guarantee communication. This paper presents a performance comparison between two reactive routing protocols; namely AODV and DSR, with soft delay deadlines and efficient utilization of resources in WMSN. The objective is to assess the real-time behavior of these two protocols upon sending multimedia content. Here, we evaluate the performance with respect to the use of these matrices like latency, Average jitter, Average delay and throughput and factors includes are CBR and multimedia traffic with varying packet size and bandwidth. DSR perform better as compared to AODV routing protocol since it discovers the routes more efficiently. AODV is better in term of Jitter than DSR. NS-2 simulator tool used for the purpose of this comparison.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Vipin Kumar ◽  
Navneet Malik ◽  
Gaurav Dhiman ◽  
Tarun Kumar Lohani

Recently, there have been exploratory growth in the research of wireless sensor network due to wide applications like health monitoring, environment monitoring, and urban traffic management. Sensor network applications have been used in habitat monitoring, border monitoring, health care, and military surveillance. In some applications, the security of these networks is very essential and need robust support. For a network, it is very important that node in the network trust each other and malicious node should be discarded. Cryptography techniques are normally used to secure the networks. Key plays a very important role in network security. Other aspects of security such as integrity, authentication, and confidentiality also depend on keys. In wireless sensor network, it is very difficult to manage the keys as this includes distribution of key, generation of new session key as per requirements, and renewal or revoke the keys in case of attacks. In this paper, we proposed a scalable and storage efficient key management scheme (SSEKMS) for wireless sensor networks that establish the three types of keys for the network: a network key that is shared by all the nodes in the network, a cluster key shared for a cluster, and pairwise key for each pair of nodes. We analysed the resiliency of the scheme (that is the probability of key compromise against the node capture) and compared it with other existing schemes. SSEKMS is a dynamic key management system that also supports the inclusion of the new node and refreshes the keys as per requirements.


2015 ◽  
Vol 2015 ◽  
pp. 1-14 ◽  
Author(s):  
Chin-Ling Chen ◽  
Tzay-Farn Shih ◽  
Yu-Ting Tsai ◽  
De-Kui Li

In recent years, wireless sensor networks have been used in a variety of environments; a wireless network infrastructure, established to communicate and exchange information in a monitoring area, has also been applied in different environments. However, for sensitive applications, security is the paramount issue. In this paper, we propose using bilinear pairing to design dynamic key management and authentication scheme of the hierarchical sensor network. We use the dynamic key management and the pairing-based cryptography (PBC) to establish the session key and the hash message authentication code (HMAC) to support the mutual authentication between the sensors and the base station. In addition, we also embed the capability of the Global Positioning System (GPS) to cluster nodes to find the best path of the sensor network. The proposed scheme can also provide the requisite security of the dynamic key management, mutual authentication, and session key protection. Our scheme can defend against impersonation attack, replay attack, wormhole attack, and message manipulation attack.


Sign in / Sign up

Export Citation Format

Share Document