Secured and Lightweight Key Distribution Mechanism for Wireless Sensor Networks

被引:0
|
作者
Roja, P. Ezhil [1 ]
Misbha, D. S. [2 ]
机构
[1] Manonmaniam Sundaranar Univ, Dept Comp Sci, Nesamony Mem Christian Coll, Marthandam, India
[2] Nesamony Mem Christian Coll, Dept Comp Applicat, Marthandam, India
关键词
WSN; Key distribution; Key agreement; Security; Authentication; Attack detection;
D O I
10.1007/978-981-19-2840-6_37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the enormous technological revolution, the most difficult tasks that humans cannot perform are now easily addressed by small digital gadgets. An example of this technological revolution is Wireless Sensor Networks (WSN). In the WSN, numerous heterogeneous types of sensors work together to sense, monitor, capture, process, and control the physical condition of a specific region or object. The WSN has been used extensively in a number of key areas, particularly in the medical, agricultural, military, and traffic management sectors. The little electronic gadget that forms the WSN is composed of three major components: a sensing component, a power storage component, and a wireless transmission component. Despite the numerous benefits of this modern technology, security remains an unresolved concern. This work aims to develop an efficient Lightweight Secure Key Distribution Protocol (LSKDP) for enhancing the process's safety in heterogeneous medical WSNs. Additionally, security and performance analyses were conducted to demonstrate the suggested methodology's efficacy. The security analysis is performed to ascertain the proposed method's vulnerability to network threats. Additionally, performance analysis is used to determine the CPU utilisation, memory consumption, processing power, and computational overhead of the suggested methodology. The experimental results indicate that the suggested strategy detects attacks more accurately and with a lower computational overhead.
引用
下载
收藏
页码:479 / 492
页数:14
相关论文
共 50 条
  • [31] Using trust in key distribution in wireless sensor networks
    Lewis, Nathan
    Foukia, Nona
    2007 IEEE GLOBECOM WORKSHOPS, PROCEEDINGS, 2007, : 377 - 381
  • [32] Multimodal Biometric-Based Secured Access Mechanism for Wireless Sensor Networks
    Preetha, S.
    Sheela, S., V
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (09) : 86 - 99
  • [33] Connectivity of Wireless Sensor Networks Secured by The Heterogeneous Random Pairwise Key Predistribution Scheme
    Eletreby, Rashad
    Yagan, Osman
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 2085 - 2092
  • [34] Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks
    Challa, Manoj
    Reddy, M. Damodar
    Reddy, P. Venkata Subba
    Mungara, Jitendra Nath
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (10): : 10 - 15
  • [35] Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks
    Challa, Manoj
    Reddy, M. Damodar
    Reddy, P. Venkata Subba
    Mungara, Jitendra Nath
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 84 - 89
  • [36] Secured Agent Platform for Wireless Sensor Networks
    Horacek, Jan
    Zboril, Frantisek, Jr.
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2011, PT I, 2011, 6591 : 476 - 485
  • [37] Secured data aggregation in wireless sensor networks
    Sathya, D.
    Kumar, Ganesh P.
    SENSOR REVIEW, 2018, 38 (03) : 369 - 375
  • [38] Public key based key distribution scheme for wireless sensor networks
    Huang, Jie
    Huang, Bei
    Tongxin Xuebao/Journal on Communications, 2011, 32 (10): : 52 - 58
  • [39] A scalable key pre-distribution mechanism for large-scale wireless sensor networks
    Shen, An-Ni
    Guo, Song
    Chien, Hung Yu
    Guo, Minyi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2009, 21 (10): : 1373 - 1387
  • [40] A key-distribution mechanism for wireless sensor networks using Zig-Zag product
    Shafiei, H.
    Khonsari, A.
    Talebi, M. S.
    Ould-Khaoua, M.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 11 (01) : 1 - 10