Deterministic Evaluation of Identity Based Random Key Distribution Using Deployment Knowledge in WSNs

PS Hepsibha, G Sanjiv Rao - International Conference on Advances in …, 2013 - Springer
International Conference on Advances in Computing, Communication and Control, 2013Springer
With the recent developments in wireless communications, to achieve secure
communications among sensor nodes in a Wireless Sensor Network (WSN), the research
community has to resolve different technical issues like design and development of efficient
node deployment and key distribution schemes. As the sensors are the resource
constrained and vulnerable nodes, and are often deployed in hostile environments, an
adversary may physically capture and compromise some of the nodes. Hence, deployment …
Abstract
With the recent developments in wireless communications, to achieve secure communications among sensor nodes in a Wireless Sensor Network (WSN), the research community has to resolve different technical issues like design and development of efficient node deployment and key distribution schemes. As the sensors are the resource constrained and vulnerable nodes, and are often deployed in hostile environments, an adversary may physically capture and compromise some of the nodes. Hence, deployment of nodes and key distribution are remained as challenging and basic issues to be addressed as they can influence the network performance metrics. Many schemes have been proposed in recent years for sensor node deployment and for key distribution. In this paper, we investigate a secure key distribution mechanism, such as Identity Based Random key Distribution scheme, for the two simple node deployment strategies, namely, Random and Grid. We first evaluate the key distribution protocol, and then we provide a comparative study that shows the improvements in the probabilistic prediction of the network performance resulting from inclusion of the two deployment schemes with the examined technique. We also show the simulation of deployment schemes of WSN using Network Simulator 2.34 with Mannasim.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References