Abhishek Srivastava, Sudhanshu Tripathi, S. Dwivedi, Prinu C. Philip
{"title":"Shape-Area Model-based Key Management in Wireless Sensor Network","authors":"Abhishek Srivastava, Sudhanshu Tripathi, S. Dwivedi, Prinu C. Philip","doi":"10.1109/RAETCS.2018.8443947","DOIUrl":null,"url":null,"abstract":"Secure communication environment creation and an accurate data delivery to the end participants from the generation point are the major constraints in IoT based real time transportation and monitoring systems. The design of networking layer based on various routing and transmission protocols suffer from the attack problem. The generation of insider attacker not only damages the network structure, it also modifies the routing path and hacking the packet information. The integration of IoT with the WSN alleviates the issues due to the insider attackers. This paper proposes the novel shape model based on Localized Geometric Voronoi Hexagon (LGVH) algorithm and the secure communication using key management procedures. The consecutive process of key establishment, update and revocation provide the necessary resistance to the insider attackers. The LGVH algorithm provides the necessary location information regarding the Sensor Nodes (SN) predicts the coverage area for the dynamic environment. This paper expands the customizable WSN simulator tool based on NS2 simulator provides the detailed coverage area. The comparative analysis between the proposed model with the existing methods regarding the various parameters confirm the effectiveness and contributions to the real-time IoT applications.","PeriodicalId":131311,"journal":{"name":"2018 Recent Advances on Engineering, Technology and Computational Sciences (RAETCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Recent Advances on Engineering, Technology and Computational Sciences (RAETCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAETCS.2018.8443947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Secure communication environment creation and an accurate data delivery to the end participants from the generation point are the major constraints in IoT based real time transportation and monitoring systems. The design of networking layer based on various routing and transmission protocols suffer from the attack problem. The generation of insider attacker not only damages the network structure, it also modifies the routing path and hacking the packet information. The integration of IoT with the WSN alleviates the issues due to the insider attackers. This paper proposes the novel shape model based on Localized Geometric Voronoi Hexagon (LGVH) algorithm and the secure communication using key management procedures. The consecutive process of key establishment, update and revocation provide the necessary resistance to the insider attackers. The LGVH algorithm provides the necessary location information regarding the Sensor Nodes (SN) predicts the coverage area for the dynamic environment. This paper expands the customizable WSN simulator tool based on NS2 simulator provides the detailed coverage area. The comparative analysis between the proposed model with the existing methods regarding the various parameters confirm the effectiveness and contributions to the real-time IoT applications.