Open Access Open Access  Restricted Access Subscription Access

Intelligent Key Administration Strategies Using CL-EKM Over Dynamic WSN


Affiliations
1 Cambridge Institute of Technology, K R Puram, Bangalore, India
2 Dept. of CSE/ISE, Cambridge Institute of Technology, K R Puram, Bangalore, India
 

Now-a-days, wireless sensor networks mainly used for emerging operations such as military/army sensing units, patient monitoring system, traffic sequence analysis as well as the movement/mobility of sensor nodes from one location to another. In this case, the key requirement of the application is security, while transferring the data between source and destination. For this case apart from the normal protocol for encryption and decryption, used effective scheme like Certificate-less Effective Key Management (CL-EKM), which provides dynamically secured communication over WSNs. The CL-EKM provides energetic key changes while the node enters into the cluster region presented into the network or leave out from the network clusters. This system assists the efficient key revocation system for negotiable nodes and reduces the effect of the node adjustment for achieving security of additional security schemes. In the security investigation of this plan demonstrates that the convention is very powerful in case of safeguarding against different attacks. Here, we execute the Certificate-less Effective Key Management scheme using Windows/Linux operating system and evaluate its time, vitality and correspondence.

Keywords

Wireless Sensor Network, CL-EKM, Key Management Protocol, Key Administration Schemes.
User
Notifications
Font Size

Abstract Views: 157

PDF Views: 0




  • Intelligent Key Administration Strategies Using CL-EKM Over Dynamic WSN

Abstract Views: 157  |  PDF Views: 0

Authors

L. Saumya
Cambridge Institute of Technology, K R Puram, Bangalore, India
M. G. Jayanthi
Dept. of CSE/ISE, Cambridge Institute of Technology, K R Puram, Bangalore, India

Abstract


Now-a-days, wireless sensor networks mainly used for emerging operations such as military/army sensing units, patient monitoring system, traffic sequence analysis as well as the movement/mobility of sensor nodes from one location to another. In this case, the key requirement of the application is security, while transferring the data between source and destination. For this case apart from the normal protocol for encryption and decryption, used effective scheme like Certificate-less Effective Key Management (CL-EKM), which provides dynamically secured communication over WSNs. The CL-EKM provides energetic key changes while the node enters into the cluster region presented into the network or leave out from the network clusters. This system assists the efficient key revocation system for negotiable nodes and reduces the effect of the node adjustment for achieving security of additional security schemes. In the security investigation of this plan demonstrates that the convention is very powerful in case of safeguarding against different attacks. Here, we execute the Certificate-less Effective Key Management scheme using Windows/Linux operating system and evaluate its time, vitality and correspondence.

Keywords


Wireless Sensor Network, CL-EKM, Key Management Protocol, Key Administration Schemes.