Volume 59 | Number 3 | Year 2018 | Article Id. IJMTT-V59P521 | DOI : https://doi.org/10.14445/22315373/IJMTT-V59P521
A Wireless Sensor Network (WSN) is a kind of remote specially appointed system that sends an expansive number of ease sensor gadgets disseminated over a region of interest. Cooperatively, they report sensor readings to an information accumulation sink or Base Station, routinely or in view of interest. While those with pivoting bunch heads, have likewise favourable circumstances as far as security, the dynamic idea of their correspondence makes most existing security arrangements lacking for them. Grouped sensor systems have been appeared to build framework throughput, diminish framework postponement, and spare vitality. In this research, demonstrate how unique key distribution, generally examined with regards to level systems, can be utilized to secure correspondence in remote sensor arrange. It is insufficient against DoS attack in view of sticking remote channels, or controlling a nodes encompassing condition to prompt the announcing of created conditions. It is the primary work that explores one of a unique key distribution as connected to progressive WSNs.
[1] H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy (S&P’03), pages 197–213, may 2003.
[2] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security, 2005. Also appeared in ACM CCS ’03.
[3] L. Eschenauer and V. D. Gligor. A key management scheme for distributed sensor networks. In 9th ACM conference on Computer and communications security, pages 41–47, 2002.
[4] D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar. Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263–270, Seattle, WA USA, 1999.
[5] C. Ferreira, M. A. Vilac¸a, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. F. Loureiro. On the secur ity of cluster-based communication protocols for wireless sensor networks. In 4th IEEE International Conference on Networking (ICN’05), volume 3420 of Lecture Notes in Computer Science, pages 449–458, Reunion Island, April 2005.
[6] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In IEEE Hawaii Int. Conf. on System Sciences, pages 4–7, january 2000.
[7] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors. In int’l Conf. on Architectural support for programming languages and operating systems, pages 93–104, 2000.
[8] J. Hwang and Y. Kim. Revisiting random key predistribution schemes for wireless sensor networks. In 2nd ACM workshop on Security of ad hoc and sensor networks, pages 43–52. ACM Press, 2004.
[9] R. Kannan, L. Ray, and A. Durresi. Efficient key predistribution schemes for sensor networks. In 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESAS´ 04), Heidelberg, Germany, August 2004.
[10] C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks. In 2nd ACM SensSys, pages 162–175, Nov 2004.
[11] C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad-Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3):293–315, 2003. Also appeared in 1st IEEE International Workshop on Sensor Network Protocols and Applications.
A Santha Devi, Dr. V Vinoba, "A Security Based Routing Algorithm and Unique Key Distribution in Wireless Sensor Network," International Journal of Mathematics Trends and Technology (IJMTT), vol. 59, no. 3, pp. 137-142, 2018. Crossref, https://doi.org/10.14445/22315373/IJMTT-V59P521