Open Access   Article Go Back

A Study on Trusted Communication in Wireless Networks

S. Hemalatha1

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 204-208, Feb-2019

Online published on Feb 28, 2019

Copyright © S. Hemalatha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Hemalatha, “A Study on Trusted Communication in Wireless Networks,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.204-208, 2019.

MLA Style Citation: S. Hemalatha "A Study on Trusted Communication in Wireless Networks." International Journal of Computer Sciences and Engineering 07.04 (2019): 204-208.

APA Style Citation: S. Hemalatha, (2019). A Study on Trusted Communication in Wireless Networks. International Journal of Computer Sciences and Engineering, 07(04), 204-208.

BibTex Style Citation:
@article{Hemalatha_2019,
author = {S. Hemalatha},
title = {A Study on Trusted Communication in Wireless Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {204-208},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=753},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=753
TI - A Study on Trusted Communication in Wireless Networks
T2 - International Journal of Computer Sciences and Engineering
AU - S. Hemalatha
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 204-208
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

Several algorithms are proposed which uses the basic scheme by predistributing random keys into nodes. The drawback is that one pair wise key may be shared by multiple links. Chan et al. presented two schemes. In their q-composite scheme, multiple keys are required to establish a secure link, which makes a trade-off between connectivity and security. In their random pair wise-key scheme, a unique pair wise key is assigned to each node and every one of a random set. This scheme provides high security but poses an upper bound on network size. Du et al. proposed the pair wise key predistribution scheme based on both the basic scheme and Blom’s scheme, from which it inherits the threshold property. On the contrary, our scheme utilizes Blom’s scheme more smoothly.

Key-Words / Index Term

Wireless, Authentication, Sensor network, Trust management

References

[1] H.DaiandH.Xu,―Triangle-basedkeymanagement scheme for wireless sensor networks," Frontiers Electrical Electron. Eng. China, vol. 4, no. 3, pp. 300-306,2009.
[2] A.PoornimaandB.Amberker,―Tree-basedkey management scheme for heterogeneous sensor networks," in 16th IEEE International Conf. Netw.,2008.
[3] Y.Zhang,W.Yang,K.Kim,andM.Park,―AnAVLtree- based dynamic key management in hierarchical wireless sensor network," in Proc. International Conf. Intelligent Inf. Hiding Multimedia Signal Process., pp. 298-303,2008.
[4] A.PoornimaandB.Amberker,―Keymanagement schemes for secure communication in heterogeneous sensor networks," International J. Recent Trends Eng.,2009.
[5] A. Das, ―An unconditionally secure key management scheme for largescale heterogeneous wireless sensor networks," in Proc. First International Commun. Syst. Netw. Workshops, pp. 1-10,2009.
[6] Y.Yang,J.Zhou,R.Deng,andF.Bao,―Hierarchicalself- healing key distribution for heterogeneous wireless sensor networks," SecurityPrivacyCommun.Netw., pp. 285-295, 2009.
[7] B. Tian, S. Han, and T. Dillon, ―A key management scheme for heterogeneous sensor networks using keyed-hash chain," in 5th International Conf. Mobile Ad-hoc Sensor Netw.,2010.
[8] J.Kim,J.Lee,andK.Rim,―Energyefficientkey management protocol in wireless sensor networks," International J. Security its Appl.,2010.
[9] M.Wen,Z.Yin,Y.Long,andY.Wang,―Anadaptivekey management framework for the wireless mesh and sensor networks," Wireless Sensor Netw.J.,2010.
[10] H.Jen-Yan,I.Liao,andH.Tang,―Aforward authentication key management scheme for heterogeneous sensor networks," EURASIP J. Wireless Commun.Netw., 2010.
[11] utilizing probabilistic key predistribution, which was improved byChanet al. And Duet al. Recently, Duet al.And Liu and Ning independently proposed to make use of deployment knowledge to further improve the performance of key establishment. Different from all these schemes, LEAP proposed by Zhu et al. assumes a weaker model, that is, there exists a short time interval within which nodes can establish pair wise keys safely after deployment.