Abstract

The aim of the study is to analyze the application of the Modulo Key Pre-Distribution (MKPD) protocol which is developed for Wireless sensor network (WSN). WSN is a collection of a large number of sensor nodes with limited resources. Bootstrapping secure communication among sensor nodes deployed in hostile environment is an important and challenging problem. An adversary may physically capture some sensors to compromise their stored sensitive data and secret keys which are used to attain confidentiality of the sensitive data. A common approach to solve problem is to use a key pre-distribution scheme in which each sensor node is assigned a subset of keys (key chain), selected from key pool prior to deployment. The keys are carefully selected that have high key sharing probability and resistance against node capture. We use deterministic key distribution scheme based on modulo function to establish the pair-wise keys among the sensor nodes. This study focuses on the application of this Modulo Key Pre-Distribution (MKPD) protocol to a group communication. It provides good key connectivity between the sensor nodes belongs to that group. And also opportunity available to increase the scalability in MKPD protocol by complementary design is also explained.

Highlights

  • A Wireless Sensor Network (WSN) is a collection of spatially distributed autonomous sensors to cooperatively monitor physical or environmental condition

  • The pair wise key pre-distribution is used to provide secure communication among sensor nodes deployed in hostile environment

  • We have presented an objective for maximizing the key connectivity among the sensor nodes by enhancing the basic modulo scheme

Read more

Summary

Introduction

A Wireless Sensor Network (WSN) is a collection of spatially distributed autonomous sensors to cooperatively monitor physical or environmental condition. Each sensor node is a small, inexpensive wireless device with limited battery power, memory storage, data processing capacity and short radio transmission range (Akyildiz et al, 2002; Pottie and Kaiser, 2000). The sensor networks are used in many applications, like military and civilian services like battlefield surveillance, flood detection and various home applications; are often deployed in hostile environments. Establishing secure communication among sensor nodes deployed in hostile environment is an important and challenging problem (Lee et al, 2007). To secure the communication among the nodes, a general approach is to use a cryptographic algorithm. When considering the constraints of the node and network, asymmetric cryptography is more expensive compared to symmetric key cryptography. Strength of the any cryptographic algorithm relies on the efficient key management techniques. The main task of key management technique is the safe distribution of secret key to communicating nodes before deployment (key pre distribution) or safe agreement of keys between communicating nodes after deployment

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.