TITLE

Secure Communications in Group-based Wireless Sensor Networks

AUTHOR(S)
Garcia, Miguel; Lloret, Jaime; Sendra, Sandra; Lacuesta, Raquel
PUB. DATE
April 2010
SOURCE
International Journal of Communication Networks & Information Se;Apr2010, Vol. 2 Issue 1, p8
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Nowadays, Wireless Sensor Networks are a hot research topic in the scientific community. Researchers seek to maximize their autonomy while paying attention to their limited resources, few computing capacity and low energy consumption. Security mechanisms must be deployed in the architecture of almost all Wireless Sensor Networks. Several research papers have verified that group-based communications improve the efficiency of the network. For this reason, a secure group-based architecture for wireless sensor networks is described in this paper. First, we will explain the methods of key creation and how they are used. Then, the key management method, which is used to determine the tasks performed by the nodes to maintain the keys updated, is detailed. The process of secure communication between groups is also explained. Finally, energy consumption measurements for each protocol operation are shown.
ACCESSION #
49005545

 

Related Articles

  • Reach on Wireless Sensor Networks Security Issues and IDS Model. JianGang Tang // Applied Mechanics & Materials;2014, Issue 530-531, p45 

    Security measures could not absolutely prevent network intrusion. The security technology of intrusion detection system had made up for the lack of preventive measures; it could provide real-time intrusion detection and take appropriate protection for network. The research directions of WSN...

  • Effects of Gain, Cost, and Number of Massages on Energy Efficiency Algorithm of Wireless Networking. Helal Abu-Ein, Ashraf Abdel-Karim // European Journal of Scientific Research;Feb2009, Vol. 27 Issue 3, p426 

    Modern communication networks systems generate large amounts of operational data. These massive collections of network-management data can grow in the order of several Terabytes per year, and typically hide "knowledge" that is crucial to some of the key tasks involved in effectively managing a...

  • Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks. Chia-Fen Hsieh; Rung-Ching Chen; Yung-Fa Huang // International Journal of Distributed Sensor Networks;2014, p1 

    With the increasing application of wireless sensor networks (WSN), the security requirements for wireless sensor network communications have become critical. However, the detection mechanisms of such systems impact the effectiveness of the entire network. In this paper, we propose a lightweight...

  • A Light-Weight Rainbow Signature Scheme for WSN. Min Zhang; Jie Zhang; Zheng-ping Jin; Hua Zhang; Qiao-yan Wen // Journal of Networks;Aug2012, Vol. 7 Issue 8, p1272 

    Since the wireless sensor network (WSN) is limited by power, computation capability and storage resources, it is difficult for the existed cryptographic schemes which are based on the traditional symmetric or public key cryptography to adapt to these restrictions. Till now, most studies are...

  • Fast Energy-Efficient Secure Dynamic Address Routing For Scalable WSNs. Ravi, G.; Surputheen, M. Mohamed; Srinivasan, R. // International Journal of Computer Science Issues (IJCSI);Mar2012, Vol. 9 Issue 2, p383 

    Secure Routing is one of the important issues in wireless sensor networks. A number of approaches have been proposed for secure routing in wireless sensor networks, but there is a lack of sufficient support for quick &secure routing in large-scale sensor networks. We consider the dynamic address...

  • Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams. Abdelkader, Manel; Hamdi, Mohamed; Boudriga, Noureddine // Journal of Networks;Sep2009, Vol. 4 Issue 7, p589 

    Recent advances in integrated electronic devices motivated the use of Wireless Sensor Networks (WSNs) in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent...

  • An Optimization of Tree Topology Based Parallel Cryptography. Damrudi, Masumeh; Ithnin, Norafida // Mathematical Problems in Engineering;2012, Vol. 2012, Special section p1 

    Public key cryptography has become of vital importance regarding the rapid development of wireless technologies. The RSA is one of the most important algorithms for secure communications in public-key cryptosystems. Since the RSA is expensive in terms of computational task which is modular...

  • An Optimization of Tree Topology Based Parallel Cryptography. Damrudi, Masumeh; Ithnin, Norafida // Mathematical Problems in Engineering;2012, Vol. 2012, Special section p1 

    Public key cryptography has become of vital importance regarding the rapid development of wireless technologies. The RSA is one of the most important algorithms for secure communications in public-key cryptosystems. Since the RSA is expensive in terms of computational task which is modular...

  • ENCRYPTION AND KEY MANAGEMENT APPROACH WITH IN-NETWORK PROCESSING IN WIRELESS SENSOR NETWORK AND SECURITY ANALYSIS. Rachna, H.; Patel, M. S. // World Journal of Science & Technology;2011, Vol. 1 Issue 12, p46 

    End to end encryption for wireless sensor networks is a challenging problem. To save the overall energy resources of the network it is agreed that sensed data need to be consolidated and aggregated on their way to the final destination. For such circumstances, this dissertation presents an...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics