Security in WSN using Polynomial Pool Based Mechanism
C. G.Agrawal, and J. Kulkarni. International Journal of Innovative Science and Modern Engineering (IJISME), 1 (8):
44-48(July 2013)
Abstract
For efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensor mobile sinks (MSs) are necessary in many wireless sensor network (WSN) applications, However, in sensor networks for pair wise key establishment and authentication between sensor nodes and mobile sinks exiting key predistribution schemes are used, the work of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by tracing a small fraction of nodes, and hence, by deploying a replicated mobile sink preloaded with some compromised keys gain the control of overall network. A three-tier general framework describe that allow the use of any pair wise key pre distribution scheme as its basic component. This scheme requires two separate key pools, one for the mobile sink to access the network, and one for pair wise key establishment between the sensors. As compared to the polynomial pool-based scheme this security framework has higher network resilience to a mobile sink replication attack.
%0 Journal Article
%1 noauthororeditor
%A G.Agrawal, Chanchal
%A Kulkarni, J. B.
%D 2013
%E Kumar, Dr. Shiv
%J International Journal of Innovative Science and Modern Engineering (IJISME)
%K Center. Distribution Hash Key Mobile Network Predistribution Prime Random Sensor Sink Wireless
%N 8
%P 44-48
%T Security in WSN using Polynomial Pool Based Mechanism
%U https://www.ijisme.org/wp-content/uploads/papers/v1i8/H0395071813.pdf
%V 1
%X For efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensor mobile sinks (MSs) are necessary in many wireless sensor network (WSN) applications, However, in sensor networks for pair wise key establishment and authentication between sensor nodes and mobile sinks exiting key predistribution schemes are used, the work of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by tracing a small fraction of nodes, and hence, by deploying a replicated mobile sink preloaded with some compromised keys gain the control of overall network. A three-tier general framework describe that allow the use of any pair wise key pre distribution scheme as its basic component. This scheme requires two separate key pools, one for the mobile sink to access the network, and one for pair wise key establishment between the sensors. As compared to the polynomial pool-based scheme this security framework has higher network resilience to a mobile sink replication attack.
@article{noauthororeditor,
abstract = {For efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensor mobile sinks (MSs) are necessary in many wireless sensor network (WSN) applications, However, in sensor networks for pair wise key establishment and authentication between sensor nodes and mobile sinks exiting key predistribution schemes are used, the work of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by tracing a small fraction of nodes, and hence, by deploying a replicated mobile sink preloaded with some compromised keys gain the control of overall network. A three-tier general framework describe that allow the use of any pair wise key pre distribution scheme as its basic component. This scheme requires two separate key pools, one for the mobile sink to access the network, and one for pair wise key establishment between the sensors. As compared to the polynomial pool-based scheme this security framework has higher network resilience to a mobile sink replication attack.},
added-at = {2021-09-23T11:11:09.000+0200},
author = {G.Agrawal, Chanchal and Kulkarni, J. B.},
biburl = {https://www.bibsonomy.org/bibtex/21091e76d4326468dcb3b7a3979f6ae69/ijisme_beiesp},
editor = {Kumar, Dr. Shiv},
interhash = {bb437245be6f80b2f2a7652bcc809c17},
intrahash = {1091e76d4326468dcb3b7a3979f6ae69},
issn = {2319-6386},
journal = {International Journal of Innovative Science and Modern Engineering (IJISME)},
keywords = {Center. Distribution Hash Key Mobile Network Predistribution Prime Random Sensor Sink Wireless},
language = {En},
month = {July},
number = 8,
pages = {44-48},
timestamp = {2021-09-23T11:11:09.000+0200},
title = {Security in WSN using Polynomial Pool Based Mechanism},
url = {https://www.ijisme.org/wp-content/uploads/papers/v1i8/H0395071813.pdf},
volume = 1,
year = 2013
}