Securing Data Transmission From Adversaries In Wsn Using Efficient Key Management Techniques

Abstract

The sensor nodes that make up the wireless sensor networks have inherent resource limitations. These nodes are generally deployed in diverse, unattended locations for capturing real time data which they convert to digital format and transmit to CPUs or base stations for further analysis. Such transmissions take place in wireless form, easily susceptible to different types of attacks by adversaries. Adversaries attempt to disclose the data illegally or just disrupt the data transmission, affecting its integrity. Establishing security in such areas is not an easy task. Literatures throwing light upon the preventive measures have collectively put forward that there is no single escape solution that could be commonly applied to all type of attacks. Any security protocol designed specifically to be used in wireless mode should take into consideration of the available resources, intention of attackers and the complex level of security that may be desired, given the criticality of data. Key management plays a prominentpart in the upkeeping of security in the wireless domain. The key management techniques focus upon the capability of nodes and the security demand imposed by any specific application. Key management can be implemented through public key management, pairwise key management, group based key management and dynamic key management techniques. Of these, the dynamic key management offers excellent scope for conservation of memory and energy resources of the sensor nodes. newline newline newlineThe proposed research had been focused on carrying out the key management process using different approaches. Firstly, a secret newline newline newline newlinekey based security solution for managing the key in hierarchically ordered wireless sensor networks had been proposed. In this regard, a Dynamic Key Management using Channel Hopping (DKMCH) technique had been proposed where the data in its transit, hops from one channel to another from source to destination. Data is transmitted on each channel for a

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced