Security in Wireless Sensor Networks: Key Management Module in SOOAWSN

  • Abuhelaleh M
  • Elleithy K
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocols for routing organization have been proposed in much research for increasing system throughput, decreasing system delay and saving energy. Even these algorithms have proposed some levels of security, but because of their dynamic nature of communication, most of their security solutions are not suitable. In this paper we focus on how to achieve the highest possible level of security by applying new key management technique that can be used during wireless sensor networks communications. For our proposal to be more effective and applicable to a large number of wireless sensor networks applications, we work on a special kind of architecture that have been proposed to cluster hierarchy of wireless sensor networks and we pick one of the most interesting protocols that have been proposed for this kind of architecture, which is LEACH. This proposal is a module of a complete solution that we are developing to cover all the aspects of wireless sensor networks communication which is labeled Secure Object Oriented Architecture for Wireless Sensor Networks (SOOAWSN) .

Cite

CITATION STYLE

APA

Abuhelaleh, M. A., & Elleithy, K. M. (2010). Security in Wireless Sensor Networks: Key Management Module in SOOAWSN. International Journal of Network Security & Its Applications, 2(4), 67–78. https://doi.org/10.5121/ijnsa.2010.2406

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free