Abstract

In recent days, Wireless Sensor Network (WSN) can be used to monitor the circumstances of various movable objects and several processes such as friendly forces monitoring, biological attack detection, fire detection and so on its applications are extended. To make all these applications reliable and secure, it is necessary to use cryptographic processes. The security of the whole network is depending on the strength of a generated key, the algorithm decides the size of the key handling and processing. In this research, a secure efficient key management scheme is proposed with the help of Chaotic African Buffalo Optimization (CABO) for wireless sensor networks. The evaluation of this method is made with the objective to improve the security strength and reduce the cost of resource. The traditional methods called genetic algorithm and an evolutionary algorithm named as Particle Swarm Optimization (PSO) is compared to verify the proposed scheme.

Highlights

  • In sensor network, the key management is one of the core securities protocols for several real time applications

  • For any legal transmission of information, it is necessary to encrypt the data. For this process the cryptography is used to convert the original information into unreadable format and while retrieving the data this encrypted data is again converted into original messages

  • The performance of the proposed Chaotic African buffalo optimization algorithm is compared with the genetic algorithm and particle swarm optimization and the African buffalo optimization algorithm

Read more

Summary

Introduction

The key management is one of the core securities protocols for several real time applications. Many researches were focused on some constrained resource such as limited battery power and processing capabilities. Apart from these constraints’ security is one of the main factors that decides the data transmission between nodes. Data transmission from one node to another is depends upon the electronic security. For any legal transmission of information, it is necessary to encrypt the data. For this process the cryptography is used to convert the original information into unreadable format and while retrieving the data this encrypted data is again converted into original messages. Some of the security issues in sensor nodes are stated as, the radio links are insecure and sensor nodes are not temper resistant (i.e., attacker obtains all security information)

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.