Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: A NEW KIND OF KEY MANAGEMENT PROTOCOL IN WIRELESS SENSOR NETWORK
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
A NEW KIND OF KEY MANAGEMENT PROTOCOL IN
WIRELESS SENSOR NETWORK

[attachment=23492]
Abstract-
Many cluster-based wireless sensor network routing protocols have been proposed to take the advantages of cluster computing. However, most of these protocols take little consideration on communication protection, which is important to ensure the network security. In this paper, a lightweight key management approach is presented. Analysis shows that this approach is an effective solution to the key management of layered cluster wireless sensor network.
CONTENTS:
 Introduction
 Key Management Protocol Analysis
 A New Kind of Key Management Protocol
 Performance Analysis
 Conclusion
I. INTRODUCTION
Wireless sensor network is a collection of information technology and the perception of a revolution. Because of the deployment of flexibility and simple maintenance, wireless sensor networks have gained wide range of application such as military surveillance,earthquakes and weather forecasting. As application gains more ground, security issues have also been a hot research topic.Wireless sensor networks are operated with limited computing power, limited energy resources, limited communications bandwidth, limited communications range,and limited storage resources. These limitations distinguish the wireless sensor networks from the traditional Internet.They are at P2P security risks. As WSN characteristics,traditional Internet, the wider use ofP2P programs because of the cost of safety can not be too high to use in the WSN.Therefore, the design of an effective cluster-based wireless sensor network key management program is currently the focus of the study.
II. KEY MANAGEMENT PROTOCOL ANALYSIS:
Two types of key management protocols are widely used in wireless sensor networks: low-energy key management protocol and lightweight key management. However,these two protocols have the following security issues:
(1) All the key nodes of the cluster were randomly assigned to each cluster head before the protocol is deployed.After running the first cluster, keys are xchanged mainly through the exchange of information between the nodes. The weakness of this scheme is that if the first cluster is compromised, the entire cluster will be broken by simple DOS attack.
(2) These two protocols are for infinite cluster head sensor network and assume the first cluster of sensor nodes greater than ordinary storage capacity and computing power. The first program is the assumption that clusters can be preset before deployment, and operation of the network after the first cluster will not change, which is obviously the majority of sub-cluster-routing protocol deviates from the operating mechanism, and the clustering of the core objectives of the network - saving energy departed from, because once the
network of non-choice of the first cluster to balance energy consumption, further away from the first cluster node energy depletion will begin to form in the local network "blind spots".
III. ANEW KIND OF KEY MANAGEMENT PROTOCOL
A. Background
In this paper we propose a dynamic clustering unlimited sensor key management protocol to resolve the above two issues. The protocol assumes that the wireless sensor system has been in existence for effective security detection mechanism, the nodes can be judged from whether or captured energy depletion becomes invalid nodes.The network entities meet the following conditions:
Sensor Node: Each sensor node is assigned unique ID number and a main key Kshar by the base station before deployment. Sensor nodes communicate with the base station, using the key encrypted data. Node ID number and key Kshar are stored in the base station. Base stations in the network allocate an initial key Kmit during the first clustering. After the completion of the clustering these initial keys are erased from the nodes memory.
Cluster head: A cluster head is an ordinary unlimited sensor node. During the operation of the network, a cluster head is responsible for the integration within the cluster node
data, transmitted to the base station, the first cluster communication between members and the use of cluster authentication key Kc to encryption, the first cluster nodes do
not know the members of the main keys Kshare.
Clusters: A cluster is composed of cluster heads and nodes. Each cluster has a unique ID number and a cluster key Kc. KMDC protocol against LEACH, and other typical
clustering TEEN - routing protocol, and cluster nodes in the cluster members of the first communication between the single-jump, no data between nodes of interaction. Clusters key Kc for the optimal portfolio management using EBS.Group Key Management algorithm to ensure that captured nodes, the need to send information for updating keys to optimal number, and each node need for the preservation of
the cluster management (Group) Key several key management at least.
Base station: As the only network component which produces and distributes the keys, the base station should be
trustable, have great storage capacity and more computing capacity to implement some ofthe larger-scale operations, be able to assume the key distribution of sensor nodes and maintain the network structure. Each cluster network corresponds to an EBS structure and the management nodes of an EBS are base stations.