{"title":"在IEEE 802.15.4无线传感器网络中使用信道跳频的动态密钥管理系统","authors":"G. Manikandan, U. Sakthi","doi":"10.1504/IJMNDI.2018.10013505","DOIUrl":null,"url":null,"abstract":"In wireless sensor network, the sensor nodes are connected to each other wirelessly and the nodes are able to enter and exit the network randomly without any prior intimation. This makes the entry of the malicious nodes into the network easy, thus making the network susceptible to various attacks. One of such attacks is jamming the transmission lines and hence corrupting the data being transmitted. In this paper, we propose to develop a dynamic key management system based on which the data message hops from one channel to another during data transmission. Since the data transmission occurs through a channel only for small duration, channels keeps changing. This minimises the probability for the attackers to determine the active channel and attack it; in order to corrupt the data.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"35 1","pages":"73"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Dynamic key management system using channel hopping in IEEE 802.15.4 wireless sensor networks\",\"authors\":\"G. Manikandan, U. Sakthi\",\"doi\":\"10.1504/IJMNDI.2018.10013505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In wireless sensor network, the sensor nodes are connected to each other wirelessly and the nodes are able to enter and exit the network randomly without any prior intimation. This makes the entry of the malicious nodes into the network easy, thus making the network susceptible to various attacks. One of such attacks is jamming the transmission lines and hence corrupting the data being transmitted. In this paper, we propose to develop a dynamic key management system based on which the data message hops from one channel to another during data transmission. Since the data transmission occurs through a channel only for small duration, channels keeps changing. This minimises the probability for the attackers to determine the active channel and attack it; in order to corrupt the data.\",\"PeriodicalId\":35022,\"journal\":{\"name\":\"International Journal of Mobile Network Design and Innovation\",\"volume\":\"35 1\",\"pages\":\"73\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Mobile Network Design and Innovation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJMNDI.2018.10013505\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Business, Management and Accounting\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Mobile Network Design and Innovation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJMNDI.2018.10013505","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
Dynamic key management system using channel hopping in IEEE 802.15.4 wireless sensor networks
In wireless sensor network, the sensor nodes are connected to each other wirelessly and the nodes are able to enter and exit the network randomly without any prior intimation. This makes the entry of the malicious nodes into the network easy, thus making the network susceptible to various attacks. One of such attacks is jamming the transmission lines and hence corrupting the data being transmitted. In this paper, we propose to develop a dynamic key management system based on which the data message hops from one channel to another during data transmission. Since the data transmission occurs through a channel only for small duration, channels keeps changing. This minimises the probability for the attackers to determine the active channel and attack it; in order to corrupt the data.
期刊介绍:
The IJMNDI addresses the state-of-the-art in computerisation for the deployment and operation of current and future wireless networks. Following the trend in many other engineering disciplines, intelligent and automatic computer software has become the critical factor for obtaining high performance network solutions that meet the objectives of both the network subscriber and operator. Characteristically, high performance and innovative techniques are required to address computationally intensive radio engineering planning problems while providing optimised solutions and knowledge which will enhance the deployment and operation of expensive wireless resources.