Secure Key Distribution in Wireless Sensor Networks

2018 ◽  
Vol 24 (8) ◽  
pp. 6013-6016
Author(s):  
K. S Umadevi ◽  
Arijit Ghosh ◽  
Anurag Menon ◽  
Mandar Nanaware

Key distribution is an inevitable part of the wireless networks and is important for node identification and authentication and also is important for maintaining data confidentiality and integrity of the communication system. In this paper, the numerous key distribution algorithms already implemented in the wireless sensor networks have been studied along with their architecture and their efficiency based on the various hardware constraints of WSN and the various attacks affecting the wireless networks like that of the DOS and node duplication attacks. On the basis of the study, a new key distribution algorithm have been suggested to overcome the drawbacks of the other methods and has focused on the same in ad hoc networks so that it can be implemented in critical situations requiring random deployment of sensors in a dynamic environment. The authors have suggested a symmetric key algorithm based on relative counters and timers which will be used to create exclusive pair keys from a master key provided by a trusted base station.

Author(s):  
Lei Zhang ◽  
Chih-Cheng Chang ◽  
Danfeng Yao

This chapter presents the technical challenges and solutions in securing wireless networks, in particular infrastructure-less wireless networks such as mobile ad hoc networks and wireless sensor networks. Communications in infrastructure-less wireless networks are challenging, as there are no trusted base stations to coordinate the activities of mobile hosts. Applied cryptographic tools, in particular threshold cryptography, play an important role in the trust establishment, message security, and key management in such networks. We describe several technical approaches that integrate applied cryptography techniques into mobile ad hoc networks and wireless sensor networks. We also outline several research directions in these areas.


2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Sensors ◽  
2019 ◽  
Vol 19 (4) ◽  
pp. 914 ◽  
Author(s):  
Lukas Nemec ◽  
Vashek Matyas ◽  
Radim Ostadal ◽  
Petr Svenda ◽  
Pierre-Louis Palant

Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic protocols for link key (re-)establishment in ad hoc networks, using two elements studied earlier—secrecy amplification and key extraction from radio channel fading. The goal of this article is to provide a unified approach to the design of these protocols, together with their experimental verification, in a real network with various settings. The overall results of our experiments show that our dynamic combination of secrecy amplification and key extraction from radio channel fading saves a significant portion of messages with corresponding energy expenditure and can adapt to a much wider scale of environments when compared to previous solutions based on the exploitation of the individual elements of secrecy amplification and key extraction from radio channel fading.


Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Sign in / Sign up

Export Citation Format

Share Document