@ijisme_beiesp

Security in WSN using Polynomial Pool Based Mechanism

, and . International Journal of Innovative Science and Modern Engineering (IJISME), 1 (8): 44-48 (July 2013)

Abstract

For efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensor mobile sinks (MSs) are necessary in many wireless sensor network (WSN) applications, However, in sensor networks for pair wise key establishment and authentication between sensor nodes and mobile sinks exiting key predistribution schemes are used, the work of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by tracing a small fraction of nodes, and hence, by deploying a replicated mobile sink preloaded with some compromised keys gain the control of overall network. A three-tier general framework describe that allow the use of any pair wise key pre distribution scheme as its basic component. This scheme requires two separate key pools, one for the mobile sink to access the network, and one for pair wise key establishment between the sensors. As compared to the polynomial pool-based scheme this security framework has higher network resilience to a mobile sink replication attack.

Links and resources

Tags