Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution

Author(s):  
Kevin Henry ◽  
Douglas R. Stinson
Author(s):  
C. R. Bharathi ◽  
Alapati Naresh ◽  
Arepalli Peda Gopi ◽  
Lakshman Narayana Vejendla

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.


2020 ◽  
Vol 17 (12) ◽  
pp. 5598-5604
Author(s):  
R. Bharanidharan

Wireless sensor networks are networks that include hundreds to thousands of autonomous distributed devices. These sensors are used to monitor physical and environmental conditions. Reliable routing protocols are designed to build a reliable and secure network with power management and control overhead and congestion. The wireless medium allows malicious user?s wireless sensor networks (WSN) to take part in actions to get a damaging attack on network control nodes. Due to the proprietary nature of such networks, they are more complex and lack tamper-resistant hardware. Security mechanisms are more wit due to the wireless and transient computing or communication complexity of communication relationships between nodes in a network. The existing method doesn?t provide security in inconvenient network performance, and the attackers modify the data and damage it. The proposed blockchain method is fixed at the same level of security, such as Polynomial Ephemeral Blockchain-based Secure Routing (PEBSR) encryption, to create a secure network. In this method, first, to authenticate the neighbor node validate using a Polynomial Ephemeral key-based Neighbor node authentication method. It evaluates the node location trust node and distributes the Ephemeral key in this key established between the nodes to communicate securely. The second method provides a cryptography chain network, and it maintains each node information in the sink database in this process if any attacker or anyone modifies the data is stored on each individual database. Finally, to find the route between each sink and participate nodes in the network. In this proposed PEBSR method, simulation results in providing efficient security, throughput, and less response time; they are compared to the existing method.


Sign in / Sign up

Export Citation Format

Share Document