A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Agronomy | India | Volume 3 Issue 9, September 2014

A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge

Shah Alam, Rajendra Kumar Seth

The wireless sensor networks are resources constraint networks. The security is most major apprehension in wireless sensor networks. The traditional cryptographic schemes are not suitable for the resource constraints sensor networks. Many key management schemes are especially designed to overcome the constraints of wireless sensor networks. Each and every key management schemes are some tradeoff between limited resources and security. The most of the key management schemes are depends upon the deployment knowledge to improve the connectivity and resilience of the network. In this proposed hierarchical key management scheme, we divide the deployment field into tracks and sector and the keys are generated and distributed based on hop count, track and sector ID. For the construction of tracks and sectors, are carried out by base stations at the beginning of the network initialization. So the security as well as energy efficient key management scheme can be achieved. The proposed scheme dynamically generates keys among sensors based on sector and sensor location ID. Our improved scheme offers high resilience, connectivity and reduced energy consumption without any additional overhead

Keywords: : Chemical fertilizer, Bio-fertilizer, Yield Production and Rice

Edition: Volume 3 Issue 9, September 2014

Pages: 411 - 414

Share this Article

How to Cite this Article?

Shah Alam, Rajendra Kumar Seth, "A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP1471, Volume 3 Issue 9, September 2014, 411 - 414

139 PDF Views | 105 PDF Downloads

Download Article PDF

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge

Shah Alam, Rajendra Kumar Seth

The wireless sensor networks are resources constraint networks. The security is most major apprehension in wireless sensor networks. The traditional cryptographic schemes are not suitable for the resource constraints sensor networks. Many key management schemes are especially designed to overcome the constraints of wireless sensor networks. Each and every key management schemes are some tradeoff between limited resources and security. The most of the key management schemes are depends upon the deployment knowledge to improve the connectivity and resilience of the network. In this proposed hierarchical key management scheme, we divide the deployment field into tracks and sector and the keys are generated and distributed based on hop count, track and sector ID. For the construction of tracks and sectors, are carried out by base stations at the beginning of the network initialization. So the security as well as energy efficient key management scheme can be achieved. The proposed scheme dynamically generates keys among sensors based on sector and sensor location ID. Our improved scheme offers high resilience, connectivity and reduced energy consumption without any additional overhead

Keywords: : Chemical fertilizer, Bio-fertilizer, Yield Production and Rice

Edition: Volume 3 Issue 9, September 2014

Pages: 346 - 349

Share this Article

How to Cite this Article?

Shah Alam, Rajendra Kumar Seth, "A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP1471, Volume 3 Issue 9, September 2014, 346 - 349

139 PDF Views | 105 PDF Downloads

Download Article PDF



Top