SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Evaluation of Security Mechanisms in Wireless Sensor Networks
ICW '05 Proceedings of the 2005 Systems Communications
Network coding: an instant primer
ACM SIGCOMM Computer Communication Review
Improving Key Distribution forWireless Sensor Networks
AHS '07 Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems
A self-organising algorithm for sensor placement in wireless mobile microsensor networks
International Journal of Wireless and Mobile Computing
International Journal of Ad Hoc and Ubiquitous Computing
ICMLC '10 Proceedings of the 2010 Second International Conference on Machine Learning and Computing
International Journal of Sensor Networks
Network capacity analysis for code propagation in Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
A moving algorithm for non-uniform deployment in mobile sensor networks
International Journal of Autonomous and Adaptive Communications Systems
A Network Coding Approach to Secret Key Distribution
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.