Abstract

Key set up and distribution in sensor network is a complex task due to inherent limitations in sensor networks. For reducing the “communication and computation overhead” we proposed that the sensor network is partitioned into different zones. Each zone has a separate intrusion detection system (IDS) and key distribution center (KDC).IDS can detect the activity in its area and communicate with its KDC. KDC is controlled by the base station. Our main concern is that how to make a secure link in between KDC to sensor nodes and KDC to the Base station. Here we will try to reduce the computation and communication overhead of the already overloaded base station by separating the intrusion detection work of the base station with a separate entity in each zone.

Highlights

  • Advancement in sensor network technologies gives new challenges in the field of control and key communication management

  • The key distribution and management protocols are divided in two different categories based on their characteristics

  • Adrian Perrig et al published a paper in the ACM journal on security protocol for wireless sensor network (Adrian Perrig et al.)[1] in which they adopted the simplest technique for key distribution “where they pre-load a single key into all nodes ahead of deployment

Read more

Summary

INTRODUCTION

Advancement in sensor network technologies gives new challenges in the field of control and key communication management. Pre-loading of keys is possible in two ways .In first approach, known a master-key method, for which all nodes are “pre-loaded with single symmetric key in its memory” and after the network deployment, every pair of “nodes in the network” uses the same “symmetric key to encrypt/decrypt” the information in between them. Alternative to master-key approach is “pair wise key based approach” Rodrigo Roman et al [2]; in this a group of “symmetric keys” are preloaded in all sensors memory to make confident that; “any two nodes have a distinct key between them” Journal of Machine Intelligence large key storage space overhead” Another approach known as, “random key distribution “L.Eschenauer,V.D.Gligor [3]” has no computational overhead to generate pair wise keys between sensor nodes. The proposed scheme reduces the computation overhead of base station as key distribution and intrusion detection is separated into different entities.

RELATED WORK
A FRAME WORK FOR KEY DISTRIBUTION IN
CONCLUSIONS AND PERSPECTIVES
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call