Cart (Loading....) | Create Account
Close category search window
 

An IPC key management scheme for Wireless Sensor Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Sharma, R. ; Deptt. of CSE, G.J.U.S&T, Hisar, India ; Chaba, Y. ; Singh, Y.

Wireless Sensor Networks (WSNs) consists of low power nodes, with limited processing, communication, and storage. The networks are made up of tiny nodes which are becoming future of many applications, but due to deployment nature the sensor nodes are prone to physical attacks against the adversaries and resource limitations raises some serious question to secure these nodes. Random failure of nodes occurred in real-life deployment scenarios. Due to the resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security is a challenging task in WSN and basic security goals in sensor networks are Confidentiality, Integrity, Authentication and Availability (CIAA). Many security solutions have been proposed in the domain so far. Due to a number of physical constraints in sensor nodes, traditional cryptographic mechanisms are not suitable to deal with such potential security threats. This paper is devoted to the research on security efficiency for wireless sensor networks. The proposed scheme of Individual Pairwise and Cluster (IPC) key management is based on the generation and distribution of the individual key, pairwise key and the cluster head broadcast key. This paper proposes a solution which uses the basic scheme, but does not use group-based deployment model and pre-deployment knowledge of the locations of nodes, and yet performs better than the schemes which uses the group-based deployment. The security analysis shows that the scheme within this paper meets the unique security needs of the sensor networks.

Published in:

Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on

Date of Conference:

28-30 Oct. 2010

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.