{"title":"Robust and secure key management in WSN using arbitrary key-deployment","authors":"Jyothi Metan, K. N. Narasimha Murthy","doi":"10.1109/ERECT.2015.7499021","DOIUrl":null,"url":null,"abstract":"The area of wireless sensor network is already shrouded with various issues e.g. energy issues, routing issues, QoS issues, and security issues. Although in past there were evolution of various secure techniques, but majority of the technique were sophisticated cryptographic implementations where time and space complexities were less emphasized. This paper presents a simple and a novel technique called as MLKS i.e. Multi Level Key Security that applies simple set theory and key distribution mechanism for securing the data aggregation in wireless sensor network. The technique is also applicable on multiple security standards supporting 128, 216, 160, or 512 bits of key size. The outcome of the proposed system is compared with the most significant work to find the proposed system outperforms the existing system with respect to computational time and storage cost.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ERECT.2015.7499021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The area of wireless sensor network is already shrouded with various issues e.g. energy issues, routing issues, QoS issues, and security issues. Although in past there were evolution of various secure techniques, but majority of the technique were sophisticated cryptographic implementations where time and space complexities were less emphasized. This paper presents a simple and a novel technique called as MLKS i.e. Multi Level Key Security that applies simple set theory and key distribution mechanism for securing the data aggregation in wireless sensor network. The technique is also applicable on multiple security standards supporting 128, 216, 160, or 512 bits of key size. The outcome of the proposed system is compared with the most significant work to find the proposed system outperforms the existing system with respect to computational time and storage cost.