{"title":"Tree based node verification key management scheme for wireless sensor networks","authors":"B. Srinivas, N Rukma Rekha, Y. V. Subbarao","doi":"10.1109/ICCES45898.2019.9002536","DOIUrl":null,"url":null,"abstract":"Sensor nodes are usually geographically placed across the particular environment. Sensor nodes are limited in capacities like computation power, memory, and processing speed. They collect sensitive information and send to the central base station. A novel TNVS is proposed that identifies certain nodes as authenticator nodes that have relatively high capability in storage, computation and power compared to the regular sensor nodes. These nodes are used for verifying new nodes that are being added into the network, thereby eliminating the entry of malicious nodes into the network. The master key that is shared by all the nodes of the network is renewed periodically to avoid node capture attack. Simulation and results show that in addition to providing authentication TNVS also requires less number of keys when compared to the existing key management schemes there by reducing the burden on memory requirement of the network.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Communication and Electronics Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES45898.2019.9002536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Sensor nodes are usually geographically placed across the particular environment. Sensor nodes are limited in capacities like computation power, memory, and processing speed. They collect sensitive information and send to the central base station. A novel TNVS is proposed that identifies certain nodes as authenticator nodes that have relatively high capability in storage, computation and power compared to the regular sensor nodes. These nodes are used for verifying new nodes that are being added into the network, thereby eliminating the entry of malicious nodes into the network. The master key that is shared by all the nodes of the network is renewed periodically to avoid node capture attack. Simulation and results show that in addition to providing authentication TNVS also requires less number of keys when compared to the existing key management schemes there by reducing the burden on memory requirement of the network.