By Topic

Secret Key Cryptography based Security Approach for Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
V. Thiruppathy Kesavan ; Department of Computer Science and Engineering, Kalasalingam University, Tamil Nadu, India ; S. Radhakrishnan

In this paper, we propose a security approach which uses Secret Key (SK) cryptography and key management along with re-keying support. A salient feature of this approach is that a SK is embedded in the source code of every node to protect the other keys in its non-volatile memory. Even the node is captured physically; the sensitive information cannot be retrieved. Our key selection protocol uses the node ID and some basic rotate and multiplication function to select the key for current data transmission. Because of this dynamic key selection, this approach identifies the replay attack, DoS attack and Sybil attack. Simulation results shows that this security mechanism efficiently controls the various attack with lower resource requirements and the network resilience against node capture is substantially improved.

Published in:

Recent Advances in Computing and Software Systems (RACSS), 2012 International Conference on

Date of Conference:

25-27 April 2012