Dynamic Key Management System for Improving Security in Three-tier Environment

1217 Words3 Pages

Related Work
The key management problem is an bigger issue in sensor field. Each and every sensor nodes are needed to transmit the node, then only the data’s are reached to base station, so each and every sensor node within a group need an keys to transmit the data. While attacker entered and also get the full access of sensor node, and ready to hack data, but they need to wait. Because the node are none of the keys at the time, transmitting time only the nodes get access of keys from the cluster head. A cluster having a variety of group in the network and each and every groups are specified using their names. All of the groups are having the number of nodes to transmit the information over the network.

The pair-wise key establishment between the sensor nodes are still more difficult to handle. Attackers are not easily handle the sensor nodes, they need to get the full access of node and also they try get the access of cluster. But the cluster get won’t allow to compromising the group and the cluster head provide the duplicated data’s, if the attacker give any kind of problem to sensor nodes.

Recent advances in wireless technology provide the security of blocking the attackers and also need to eliminate the attackers in the network. But in this paper providing the new technique to handle the attacker using an duplicated data as an backbone and also using dynamic key management in this system to providing the more security of the data’s in the wireless sensor network (WSN). So attackers are get confused to finds the original data’s. They don’t know the original data’s are safely send to the base station.

The Key activity of this paper is to avoid the data loss in the network and also providing...

... middle of paper ...

...obile Sink Replica In Wireless Sensor Network And Authenticate It With Key Distribution” (IJERT), ISSN:2278-0181, Vol. 2 Issue 6, June 2013.

[7]B.J. Culpepper and H.C. Tseng , “Sinkhole Intrusion Indicators in DSR MANETs,”Proc. First Int’l Conf. Broadband Networks (Broad-Nets ’04), pp.681-688, Oct. 2004.

[8]Y. Tirta, Z. Li, Y. Lu, and S. Bagchi, “Efficient Collection of Sensor Data in Remote Fields Using Mobile Collectors,” Proc. 13th Int’l Conf. Computer Comm. And Networks (ICCN ’04), Oct. 2004.

[9]A. Rasheed and R. Mahapatra, “An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks,” Proc. IEEE 27th Int’l Performance Computing and Comm. Conf. (IPCCC ’08), pp. 264-270, Dec. 2008.

[10]L. Lamport, “Password Authentication with Insecure Communication,” Comm. ACM, vol, 24, no. 11, pp. 770-772, Nov. 1981.

Open Document