ACO based key management routing mechanism for WSN security and data collection

Author(s):  
Celestine Iwendi ◽  
Zhiyong Zhang ◽  
Xin Du

Offering efficient key management scheme (KMS) in WSN faces many challenges that will significantly impact the design and implementation of security protocols for WSN. The goal of KMS is to provide an effective environment in which the sensor node can communicate in a secure manner. It should be able to resolve the issue of generate, allocate the cryptographic keys in WSN in an efficient and effective manner. Hence, the methods for trustworthy allocation and management of these keys are very important for security of WSN. Many KMSs have been developed in recent years. However inherent characteristics of a WSN make incorporating security a great challenge. This paper presents a comprehensive review of current state-of-the-art of KMS designed for WSN security and compare with respect to several evaluation metrics. This paper also investigates the security requirements, goals and challenges of KMS based on existing literature reviews. We also attempt to provide insight in to potential research trends in the area of WSN security and outline the approaches that are likely to play a very important role.


2014 ◽  
Vol 665 ◽  
pp. 654-660 ◽  
Author(s):  
Xin Yang Zhang ◽  
Ji Dong Wang

In wireless sensor network (WSN) security, key management is a big challenge issue as it forms the basic security structure of the networks. Various WSN key management schemes proposed so far attempt to satisfy the security, efficiency and operation requirements under the resource constrain of WSN. In this paper, the constraints of WSN and requirements of key management are discussed. Several key management schemes are presented, analyzed and classified. Finally, some unresolved issues and future works on these schemes are identified. The discussion focuses on efficiency, fault tolerant, influence reduction, dynamic management and cross-layer security.


2016 ◽  
Vol 12 (11) ◽  
pp. 4549-4556
Author(s):  
Mohamed Musthafa

In this work we present novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the cluster heads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network. We also proposing a special security routing architecture called Local Intrusion Detection (LID) to detect Black Hole Attack (BHA) over Ad hoc On Demand Distance Vector (AODV) MANET routing protocol. In LID security routing mechanism, the intrusion detection is performed locally using the previous node of the attacker node instead of performing the intrusion detection via the source node as in Source Intrusion Detection (SID) security routing mechanism. By performing LID security routing mechanism, the security mechanism overhead would be decreased.


2008 ◽  
Vol 35 (3) ◽  
pp. 232-241 ◽  
Author(s):  
RICHARD S. APPELDOORN

SUMMARYFisheries in Puerto Rico and the United States (US) Virgin Islands are predominately dependent on nearshore coral reef ecosystems and have suffered from historical overfishing. The unique characteristics of reef fisheries, including strong habitat dependence, susceptibility to coastal impacts, diffuse landing sites and strong multispecies and multigear interactions suggest that standard approaches to fisheries management, especially those typically considered by the US Regional Fishery Management Councils, would not be applicable. Current management authority is split between local and federal agencies; however, there exists no uniform context and direction to current management initiatives, which results in lost efficiencies and opportunities. Proposed here is a new vision for fisheries management that takes into consideration the local ecological and socioeconomic characteristics of fishing, is compatible with regional resources and capacity, is ecosystem based and targets full stakeholder participation. Only an ecosystem-based approach can lead fisheries management out of the trap of unrealistic data collection and analysis demands, while at the same time refocusing emphasis away from attitudes and practices that promote overfishing. Management must be based on first principles regarding the desired state of the ecosystem and initiate strategies based on these principles. The key management goal is not to maximize fisheries catch, but to maintain the ecosystem in a state that will lead to sustained production. First principles would include maintaining ecosystem integrity and function, protecting all habitats and water quality, applying the precautionary approach, monitoring reference points and recognizing that production has limits. Resulting management tactics include marine reserves (to meet multiple goals), closed spawning aggregations, gear restrictions to maintain trophic balance and habitats, targeted data collection and assessments, adopting co-management practices and using ecosystem or community-based metrics. Fisheries management must fully incorporate the tools, resources and methods available within coastal zone management and other environmental agencies, while standards within those programmes must protect ecosystem health. Implementation will require attending to structural barriers inherent within existing fisheries legislation and regulations, multiple jurisdictions and the current cultures of scientists, managers and fisherfolk. Initial efforts should focus on developing a common language and frame of reference for all stakeholders.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3096-3103

Wireless sensor networks (WSNs) consist of sensor nodes, which act as source and link nodes through which the data forward to sink node. However, the nodes in network have limited computation complexity, transmission capability and restricted battery life. Several routing protocols are available to improve the performance of network but very few concentrates on security issues. The performance of routing and security protocol in WSN affect due to unreliable low power links, insecure communication, threats, and resource limitations which limits the design of an efficient routing and security algorithm in wireless sensor networks. In this paper, we propose a secure energy efficient routing protocol with effective data collection and key management in dynamic WSN. The routing protocol prolongs network lifetime and minimizes energy consumption. The routing protocol implement with A* algorithm and security improve with EECLDSA (Enhanced Elliptic Curve Logic Discrete Algorithm). The combined Secure Energy Efficient Network Priority Routing (SEENPR) apply for effective data collection and key management in WSNs. SEENPR uses k-means algorithm to improve cluster head (CH) selection using Euclidean distance. The SEENPR implement in testbed to evaluate performance with respect to security and key management.


Author(s):  
S.W. Hui ◽  
D.F. Parsons

The development of the hydration stages for electron microscopes has opened up the application of electron diffraction in the study of biological membranes. Membrane specimen can now be observed without the artifacts introduced during drying, fixation and staining. The advantages of the electron diffraction technique, such as the abilities to observe small areas and thin specimens, to image and to screen impurities, to vary the camera length, and to reduce data collection time are fully utilized. Here we report our pioneering work in this area.


Sign in / Sign up

Export Citation Format

Share Document