Abstract

The wireless sensor network (WSN) signifies to a gathering of spatially spread and committed sensors for observing and logging the physical states of the environment and for organizing the information gathered at the central Base station. Many security threats may affect the functioning of these networks. Security of the data in the system depends on the cryptographic procedure and the methods where encryption and decryption keys are developed among the sensors. Symmetric key foundation is one of the best applicable ideal models for safe exchanges in WSNs. The main goal is to improve and evaluate certain issues, such as node attack, to provide better key strength, connectivity, security for node interaction, and throughput. Uniform Balanced Incomplete Block Design (UBIBD) is used to generate the keys allocated by the base station to the cluster head. The cluster head distributes keys to its members using Symmetric Balanced Incomplete Block Design (SBIBD), and the keys are refreshed on a regular basis to avoid out-of-date entries. In wireless sensor networks, compromised nodes can be used to inject false reports. The concept of interacting between sensor nodes using keys and establishing a secure connection aids in ensuring the network's security.

Highlights

  • A wireless sensor network has a massive number of minute nodes, each with its own set of energy limitations and computing difficulties

  • wireless sensor network (WSN) necessitates the use of a cryptography algorithm, which must be appropriately chosen, and the most crucial component for those algorithms is to resolve the Key agreement or management problem, which would be considered necessary provide the encrypted and authenticated data transmission among sensor nodes in order to have a channel with good security

  • The essence of the key management scheme's major updation based on a unified design is illustrated, two main update techniques are proposed, and the results of the three approaches are analysed in two ways

Read more

Summary

Introduction

A wireless sensor network has a massive number of minute nodes, each with its own set of energy limitations and computing difficulties. WSN necessitates the use of a cryptography algorithm, which must be appropriately chosen, and the most crucial component for those algorithms is to resolve the Key agreement or management problem, which would be considered necessary provide the encrypted and authenticated data transmission among sensor nodes in order to have a channel with good security. Because each node has to maintain keys with all of the other sensor nodes in the network, the pair-wise keys-based approach increases key storage overhead.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.