Abstract
Key distribution is an inevitable part of the wireless networks and is important for node identification and authentication and also is important for maintaining data confidentiality and integrity of the communication system. In this paper, the numerous key distribution algorithms already implemented in the wireless sensor networks have been studied along with their architecture and their efficiency based on the various hardware constraints of WSN and the various attacks affecting the wireless networks like that of the DOS and node duplication attacks. On the basis of the study, a new key distribution algorithm have been suggested to overcome the drawbacks of the other methods and has focused on the same in ad hoc networks so that it can be implemented in critical situations requiring random deployment of sensors in a dynamic environment. The authors have suggested a symmetric key algorithm based on relative counters and timers which will be used to create exclusive pair keys from a master key provided by a trusted base station.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.