Shape-Area Model-based Key Management in Wireless Sensor Network

Abhishek Srivastava, Sudhanshu Tripathi, S. Dwivedi, Prinu C. Philip
{"title":"Shape-Area Model-based Key Management in Wireless Sensor Network","authors":"Abhishek Srivastava, Sudhanshu Tripathi, S. Dwivedi, Prinu C. Philip","doi":"10.1109/RAETCS.2018.8443947","DOIUrl":null,"url":null,"abstract":"Secure communication environment creation and an accurate data delivery to the end participants from the generation point are the major constraints in IoT based real time transportation and monitoring systems. The design of networking layer based on various routing and transmission protocols suffer from the attack problem. The generation of insider attacker not only damages the network structure, it also modifies the routing path and hacking the packet information. The integration of IoT with the WSN alleviates the issues due to the insider attackers. This paper proposes the novel shape model based on Localized Geometric Voronoi Hexagon (LGVH) algorithm and the secure communication using key management procedures. The consecutive process of key establishment, update and revocation provide the necessary resistance to the insider attackers. The LGVH algorithm provides the necessary location information regarding the Sensor Nodes (SN) predicts the coverage area for the dynamic environment. This paper expands the customizable WSN simulator tool based on NS2 simulator provides the detailed coverage area. The comparative analysis between the proposed model with the existing methods regarding the various parameters confirm the effectiveness and contributions to the real-time IoT applications.","PeriodicalId":131311,"journal":{"name":"2018 Recent Advances on Engineering, Technology and Computational Sciences (RAETCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Recent Advances on Engineering, Technology and Computational Sciences (RAETCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAETCS.2018.8443947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Secure communication environment creation and an accurate data delivery to the end participants from the generation point are the major constraints in IoT based real time transportation and monitoring systems. The design of networking layer based on various routing and transmission protocols suffer from the attack problem. The generation of insider attacker not only damages the network structure, it also modifies the routing path and hacking the packet information. The integration of IoT with the WSN alleviates the issues due to the insider attackers. This paper proposes the novel shape model based on Localized Geometric Voronoi Hexagon (LGVH) algorithm and the secure communication using key management procedures. The consecutive process of key establishment, update and revocation provide the necessary resistance to the insider attackers. The LGVH algorithm provides the necessary location information regarding the Sensor Nodes (SN) predicts the coverage area for the dynamic environment. This paper expands the customizable WSN simulator tool based on NS2 simulator provides the detailed coverage area. The comparative analysis between the proposed model with the existing methods regarding the various parameters confirm the effectiveness and contributions to the real-time IoT applications.
基于形状-区域模型的无线传感器网络密钥管理
安全的通信环境创建和从生成点向最终参与者的准确数据传输是基于物联网的实时运输和监控系统的主要制约因素。基于各种路由和传输协议的网络层设计受到攻击问题的困扰。内部攻击者的产生不仅会破坏网络结构,还会修改路由路径,对报文信息进行黑客攻击。物联网与无线传感器网络的融合缓解了内部攻击者带来的问题。本文提出了一种基于局部几何Voronoi六边形(LGVH)算法的新型形状模型,并采用密钥管理程序进行安全通信。密钥建立、更新和撤销的连续过程为内部攻击者提供了必要的抵抗。LGVH算法根据传感器节点SN (Sensor Nodes)提供必要的位置信息,预测动态环境的覆盖区域。本文扩展了基于NS2模拟器的可定制WSN模拟器工具,提供了详细的覆盖区域。将所提出的模型与现有方法在各种参数方面的对比分析,证实了该模型的有效性和对实时物联网应用的贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信