An Effective Time Management Schema in WSNs
Author(s) -
M. Krishna Prasad,
C. H. Sandeep
Publication year - 2011
Publication title -
international journal of smart sensor and adhoc network
Language(s) - English
Resource type - Journals
ISSN - 2248-9738
DOI - 10.47893/ijssan.2011.1001
Subject(s) - computer science , computer network , denial of service attack , wireless sensor network , computer security , key management , schema (genetic algorithms) , encryption , the internet , machine learning , world wide web
WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and Existing security designs mostly provide a hop-by-hop security paradigm. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as random node capture attack, report disruption attacks and selective forwarding attacks. We come up with a new concept that provide end-toend security framework in which secret keys are generated and each node stores a few keys based on Time Schema . The proposed multifunctional key management framework assures both node-to-sink and node-to-node authentication along the report forwarding routes.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom