Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Key Management Technique to Secure Information Sharing of the Nodes within a Cluster of WSN


Affiliations
1 Department of Computer Science and Engineering, Islamic University, Kushtia, Bangladesh
     

   Subscribe/Renew Journal


The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialise secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.

Keywords

Sensor Network, Clustering Technique, Key Management, Authentication, Security.
Subscription Login to verify subscription
User
Notifications
Font Size



  • A Key Management Technique to Secure Information Sharing of the Nodes within a Cluster of WSN

Abstract Views: 462  |  PDF Views: 0

Authors

Md. Habibur Rahman
Department of Computer Science and Engineering, Islamic University, Kushtia, Bangladesh
Md. Ibrahim Abdullah
Department of Computer Science and Engineering, Islamic University, Kushtia, Bangladesh

Abstract


The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialise secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.

Keywords


Sensor Network, Clustering Technique, Key Management, Authentication, Security.

References