scholarly journals Multi-tier Framework for Optimizing Pairwise Key Predistribution in Sensory Applications

Security has been always a prominent concern in Wireless Sensor Network (WSN) irrespective of the evolution of various scientific approaches that mainly mechanizes key management approaches to secure the communication system among the resource constraints sensors. Out of various key management approaches, pairwise key is one effective approach to ensure cost effective key management scheme; however, review of existing approaches shows that they still are characterized by various issues connected to optimized performance. Adopting analytical research methodology, the proposed system implements an optimized multi-tier framework for resisting key-based threats and it targets to introduce a lightweight pair wise predistribution of keys by joint integration of enhanced public key encryption and digital signature. The study outcome shows that proposed system offer a better security performance in contrast to existing pair wise predistribution of keys.

Author(s):  
Abdelhamid Helali ◽  
Amina Msolli ◽  
Hassen Maaref ◽  
Ridha Mghaieth

Wireless sensor networks (WSNs) have attracted a lot of interests over last years in security to ensure integrity, authenticity and data confidentiality. WSN applications are numerous, which range from smart home in indoor deployment offices to smart agriculture in outdoor deployments. Due to the deployment of nodes in remote areas, the solution brought to the wireless sensor network to increase the information security consists in protecting the messages exchanged between nodes. In the paper, modifications in the key management scheme are presented. Due to resource constraints in the sensor nodes, the proposed scheme ensures a distribution of the secured keys between nodes. New session keys transmitted between sensor nodes are defined during the discovery and path key phases. The experimental results prove that the proposed scheme is adapted to the WSN applications in terms of connectivity and resiliency.


Sensors ◽  
2020 ◽  
Vol 20 (6) ◽  
pp. 1543 ◽  
Author(s):  
Erdong Yuan ◽  
Liejun Wang ◽  
Shuli Cheng ◽  
Naixiang Ao ◽  
Qingrui Guo

The secure transmission of data within a network has received great attention. As the core of the security management mechanism, the key management scheme design needs further research. In view of the safety and energy consumption problems in recent papers, we propose a key management scheme based on the pairing-free identity based digital signature (PF-IBS) algorithm for heterogeneous wireless sensor networks (HWSNs). Our scheme uses the PF-IBS algorithm to complete message authentication, which is safer and more energy efficient than some recent schemes. Moreover, we use the base station (BS) as the processing center for the huge data in the network, thereby saving network energy consumption and improving the network life cycle. Finally, we indirectly prevent the attacker from capturing relay nodes that upload data between clusters in the network (some cluster head nodes cannot communicate directly). Through performance evaluation, the scheme we proposed reasonably sacrifices part of the storage space in exchange for entire network security while saving energy consumption.


2020 ◽  
Vol 9 (1) ◽  
pp. 2200-2205

The Wireless Sensor Network (WSN) has three critical issues as like network lifetime, saving energy and security. A sensor node has limited battery power so it does need an effective key distribution and management mechanism for a safe communication. In the research literatures a massive key supply and administration methodology had been proposed. Thus, there exists a literature report of numerous schemes in WSNs for Key management and done with a wide analysis to classify the available techniques of key management and the expectable network security on them is studied. In this method a secure efficient key management scheme is proposed with the help of Ant Lion Optimization (ALO) for WSN. The aim of this method is to obtain improved security strength with cost effective. The nature of the ant lion in hunting its prey is derived for the ALO algorithm which known for its meta-heuristic function. In resolving the optimization complications with the advantage of having a great speed and limited parameters it is proved to have a better performance


2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

Sign in / Sign up

Export Citation Format

Share Document