International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 140

Research Paper | Agronomy | India | Volume 3 Issue 9, September 2014


A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge

Shah Alam [2] | Rajendra Kumar Seth [2]


Abstract: The wireless sensor networks are resources constraint networks. The security is most major apprehension in wireless sensor networks. The traditional cryptographic schemes are not suitable for the resource constraints sensor networks. Many key management schemes are especially designed to overcome the constraints of wireless sensor networks. Each and every key management schemes are some tradeoff between limited resources and security. The most of the key management schemes are depends upon the deployment knowledge to improve the connectivity and resilience of the network. In this proposed hierarchical key management scheme, we divide the deployment field into tracks and sector and the keys are generated and distributed based on hop count, track and sector ID. For the construction of tracks and sectors, are carried out by base stations at the beginning of the network initialization. So the security as well as energy efficient key management scheme can be achieved. The proposed scheme dynamically generates keys among sensors based on sector and sensor location ID. Our improved scheme offers high resilience, connectivity and reduced energy consumption without any additional overhead


Keywords: Chemical fertilizer, Bio-fertilizer, Yield Production and Rice


Edition: Volume 3 Issue 9, September 2014,


Pages: 411 - 414


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Shah Alam, Rajendra Kumar Seth, "A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 411-414, https://www.ijsr.net/get_abstract.php?paper_id=SEP1471


Downloads: 140

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge

Shah Alam [2] | Rajendra Kumar Seth [2]


Abstract: The wireless sensor networks are resources constraint networks. The security is most major apprehension in wireless sensor networks. The traditional cryptographic schemes are not suitable for the resource constraints sensor networks. Many key management schemes are especially designed to overcome the constraints of wireless sensor networks. Each and every key management schemes are some tradeoff between limited resources and security. The most of the key management schemes are depends upon the deployment knowledge to improve the connectivity and resilience of the network. In this proposed hierarchical key management scheme, we divide the deployment field into tracks and sector and the keys are generated and distributed based on hop count, track and sector ID. For the construction of tracks and sectors, are carried out by base stations at the beginning of the network initialization. So the security as well as energy efficient key management scheme can be achieved. The proposed scheme dynamically generates keys among sensors based on sector and sensor location ID. Our improved scheme offers high resilience, connectivity and reduced energy consumption without any additional overhead


Keywords: Chemical fertilizer, Bio-fertilizer, Yield Production and Rice


Edition: Volume 3 Issue 9, September 2014,


Pages: 346 - 349


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Shah Alam, Rajendra Kumar Seth, "A Novel Secure Key Management Scheme for Wireless Sensor Networks Using Post Deployment Knowledge", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 346-349, https://www.ijsr.net/get_abstract.php?paper_id=SEP1471

Similar Articles with Keyword 'Chemical'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022

Pages: 481 - 483

Data-Driven Approach for SOC Estimation of Battery using Long-Short Term Memory Network

S. Sai Rahul

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1974 - 1979

Implementation of Enhanced Feedback in Automated Latent Fingerprint Matcher

Lekshmi S P [2] | Lizmol Stephen [2]

Share this Article
Top