EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to the large number of sensor nodes and lack of information...
Gespeichert in:
Veröffentlicht in: | American journal of applied sciences 2014-06, Vol.11 (6), p.969-977 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 977 |
---|---|
container_issue | 6 |
container_start_page | 969 |
container_title | American journal of applied sciences |
container_volume | 11 |
creator | Lalitha, T Kumar, R Saravana Hamsaveni, R |
description | Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to the large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence, an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. In this study, the authors have developed a cluster based technique for key management in wireless sensor network. |
doi_str_mv | 10.3844/ajassp.2014.969.977 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1551083657</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1551083657</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1927-b75f9d52d6ca74eba1359ac94c0888dd17dca37bb7f2627bb020dd08428f22b33</originalsourceid><addsrcrecordid>eNotkM1ugzAQhK2qlZqmfYJefOwF6j8wPiJqEpQEpEAU9WQZG6RESUlxc-jb1yg97Yx2NNr9AHjFKKQJY-_6qJ27hARhFopYhILzOzDDUcQCGjN8P2kWB4JQ8QienDsiRGPC8QxUMs-LrJBlA1fyE27SMl3IzWTT8gOmu2bpdZGlTVGVsM6Wfgfzagv3xVauZV3DWpa196Vs9tV2VT-Dh16fXPfyP-dgl8smWwbrauFr1oHBgvCg5VEvbERsbDRnXasxjYQ2ghmUJIm1mFujKW9b3hN_aNsigqxFCSNJT0hL6Ry83Xov4_B97dyPOh-c6U4n_dUNV6f87xglNI64j9Jb1IyDc2PXq8t4OOvxV2GkJnzqhk9N-JTHpzw--gdl4l3I</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1551083657</pqid></control><display><type>article</type><title>EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Free Full-Text Journals in Chemistry</source><creator>Lalitha, T ; Kumar, R Saravana ; Hamsaveni, R</creator><creatorcontrib>Lalitha, T ; Kumar, R Saravana ; Hamsaveni, R</creatorcontrib><description>Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to the large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence, an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. In this study, the authors have developed a cluster based technique for key management in wireless sensor network.</description><identifier>ISSN: 1546-9239</identifier><identifier>EISSN: 1554-3641</identifier><identifier>DOI: 10.3844/ajassp.2014.969.977</identifier><language>eng</language><subject>Energy consumption ; Energy management ; Hardware ; Management ; Remote sensors ; Sensors ; Tasks ; Wireless networks</subject><ispartof>American journal of applied sciences, 2014-06, Vol.11 (6), p.969-977</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Lalitha, T</creatorcontrib><creatorcontrib>Kumar, R Saravana</creatorcontrib><creatorcontrib>Hamsaveni, R</creatorcontrib><title>EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS</title><title>American journal of applied sciences</title><description>Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to the large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence, an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. In this study, the authors have developed a cluster based technique for key management in wireless sensor network.</description><subject>Energy consumption</subject><subject>Energy management</subject><subject>Hardware</subject><subject>Management</subject><subject>Remote sensors</subject><subject>Sensors</subject><subject>Tasks</subject><subject>Wireless networks</subject><issn>1546-9239</issn><issn>1554-3641</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNotkM1ugzAQhK2qlZqmfYJefOwF6j8wPiJqEpQEpEAU9WQZG6RESUlxc-jb1yg97Yx2NNr9AHjFKKQJY-_6qJ27hARhFopYhILzOzDDUcQCGjN8P2kWB4JQ8QienDsiRGPC8QxUMs-LrJBlA1fyE27SMl3IzWTT8gOmu2bpdZGlTVGVsM6Wfgfzagv3xVauZV3DWpa196Vs9tV2VT-Dh16fXPfyP-dgl8smWwbrauFr1oHBgvCg5VEvbERsbDRnXasxjYQ2ghmUJIm1mFujKW9b3hN_aNsigqxFCSNJT0hL6Ry83Xov4_B97dyPOh-c6U4n_dUNV6f87xglNI64j9Jb1IyDc2PXq8t4OOvxV2GkJnzqhk9N-JTHpzw--gdl4l3I</recordid><startdate>20140611</startdate><enddate>20140611</enddate><creator>Lalitha, T</creator><creator>Kumar, R Saravana</creator><creator>Hamsaveni, R</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140611</creationdate><title>EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS</title><author>Lalitha, T ; Kumar, R Saravana ; Hamsaveni, R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1927-b75f9d52d6ca74eba1359ac94c0888dd17dca37bb7f2627bb020dd08428f22b33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Energy consumption</topic><topic>Energy management</topic><topic>Hardware</topic><topic>Management</topic><topic>Remote sensors</topic><topic>Sensors</topic><topic>Tasks</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Lalitha, T</creatorcontrib><creatorcontrib>Kumar, R Saravana</creatorcontrib><creatorcontrib>Hamsaveni, R</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>American journal of applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lalitha, T</au><au>Kumar, R Saravana</au><au>Hamsaveni, R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS</atitle><jtitle>American journal of applied sciences</jtitle><date>2014-06-11</date><risdate>2014</risdate><volume>11</volume><issue>6</issue><spage>969</spage><epage>977</epage><pages>969-977</pages><issn>1546-9239</issn><eissn>1554-3641</eissn><abstract>Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to the large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence, an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. In this study, the authors have developed a cluster based technique for key management in wireless sensor network.</abstract><doi>10.3844/ajassp.2014.969.977</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1546-9239 |
ispartof | American journal of applied sciences, 2014-06, Vol.11 (6), p.969-977 |
issn | 1546-9239 1554-3641 |
language | eng |
recordid | cdi_proquest_miscellaneous_1551083657 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Free Full-Text Journals in Chemistry |
subjects | Energy consumption Energy management Hardware Management Remote sensors Sensors Tasks Wireless networks |
title | EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T23%3A48%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=EFFICIENT%20KEY%20MANAGEMENT%20AND%20AUTHENTICATION%20SCHEME%20FOR%20WIRELESS%20SENSOR%20NETWORKS&rft.jtitle=American%20journal%20of%20applied%20sciences&rft.au=Lalitha,%20T&rft.date=2014-06-11&rft.volume=11&rft.issue=6&rft.spage=969&rft.epage=977&rft.pages=969-977&rft.issn=1546-9239&rft.eissn=1554-3641&rft_id=info:doi/10.3844/ajassp.2014.969.977&rft_dat=%3Cproquest_cross%3E1551083657%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1551083657&rft_id=info:pmid/&rfr_iscdi=true |