Siddiq Iqbal, P. S, P. N., Sukrutha H, Ganesh PurushottamShanbhag
{"title":"Attack Resistant Secure Key Management in Wireless Sensor Networks","authors":"Siddiq Iqbal, P. S, P. N., Sukrutha H, Ganesh PurushottamShanbhag","doi":"10.1109/ICAIT47043.2019.8987362","DOIUrl":null,"url":null,"abstract":"A sensor node has limited security so it needs effective key distribution and management mechanism for secure communication. This paper aims at proposing the Secure Key Management in WSN. The main objective is to evaluate and enhance certain issues like attack on the nodes, security in communication between the nodes, energy consumption and throughput. The concept of communication between the nodes using keys and establishing a secure connection helps in securing the network. The scheme used in our paper to secure the network is Advanced Blom’s Single Space Key Distribution.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 1st International Conference on Advances in Information Technology (ICAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIT47043.2019.8987362","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A sensor node has limited security so it needs effective key distribution and management mechanism for secure communication. This paper aims at proposing the Secure Key Management in WSN. The main objective is to evaluate and enhance certain issues like attack on the nodes, security in communication between the nodes, energy consumption and throughput. The concept of communication between the nodes using keys and establishing a secure connection helps in securing the network. The scheme used in our paper to secure the network is Advanced Blom’s Single Space Key Distribution.