A key management scheme for Wireless Sensor Network using received signal strength indicator

Author(s):  
Sudipto Roy ◽  
Manisha J Nene
2015 ◽  
Vol 740 ◽  
pp. 823-829
Author(s):  
Meng Long Cao ◽  
Chong Xin Yang

Firstly, the characteristics of regular Zigbee localization algorithms-the received signal strength indicator algorithm (RSSI) and the weighted centroid localization algorithm are introduced. Then, the factors of the errors existing in the aforementioned algorithms are analyzed. Based on these above, the improved RSSI algorithm-correction geometric measurement based on weighted is proposed. Finally, utilizing this algorithm to design and implement the localization nodes, which have the CC2431 wireless microcontroller on them. The simulation and experimental results show that the accuracy of this localization algorithm improved about 2%, comparing with the regular algorithms.


2012 ◽  
Vol 8 (9) ◽  
pp. 547471 ◽  
Author(s):  
Yiying Zhang ◽  
Xiangzhen Li ◽  
Jianming Liu ◽  
Jucheng Yang ◽  
Baojiang Cui

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Gulzar Mehmood ◽  
Muhammad Sohail Khan ◽  
Abdul Waheed ◽  
Mahdi Zareei ◽  
Muhammad Fayaz ◽  
...  

Wireless Sensor Network (WSN) is a particular network built from small sensor nodes. These sensor nodes have unique features. That is, it can sense and process data in WSN. WSN has tremendous applications in many fields. Despite the significance of WSN, this kind of network faced several issues. The biggest problems rising in WSN are energy consumption and security. Robust security development is needed to cope with WSN applications. For security purposes in WSN, cryptography techniques are very favorable. However, WSN has resource limitations, which is the main problem in applying any security scheme. Hence, if we are using the cryptography scheme in WSN, we must first guarantee that it must be energy-efficient. Thus, we proposed a secure hybrid session key management scheme for WSN. In this scheme, the major steps of public key cryptography are minimized, and much of the operations are based on symmetric key cryptography. This strategy extensively reduces the energy consumption of WSN and ensures optimum security. The proposed scheme is implemented, and their analysis is performed using different parameters with benchmark schemes. We concluded that the proposed scheme is energy-efficient and outperforms the available benchmark schemes. Furthermore, it provides an effective platform for secure key agreements and management in the WSN environment.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Hongbin Wang ◽  
Liping Feng

This paper studies the security location mechanism of the sensor network node under the attack of Sybil and analyzes the safe attacks which are possibly accepted and safe requirement in the location system. Since RSSI (Received Signal Strength Indicator) possesses the energy transmission function, different transmission energy will cause it to produce different RSSI readings. Furthermore, this kind of method cannot increase the burden on Wireless Sensor Network (WSN). It conducts an analysis between two receiving nodes, compares RSSI ratios to tickle the problem of time inconsistency of RSSI, and sets a threshold to detect Sybil by the emulation results. Research shows that the ratio value of different receiving nodes by using RSSI can resolve time difference because of the RSSI or unreliability which results from the asymmetry of transmission ratio. The thesis makes a comparison that the number of receiving nodes has an influence on attack effect. Utilizing the RSSI ratio values can exactly detect the Sybil attack. Emulation findings demonstrate that the detection method put forward by the thesis owns better security.


Sign in / Sign up

Export Citation Format

Share Document