Multiple secret keys based security for wireless sensor networks

9Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

We propose a security approach that uses secret key cryptography and key management along with re-keying support. A salient feature of our approach is that a secret key is embedded in the source code of every node to protect the other keys in its non-volatile memory. Even the node is captured physically; the sensitive information cannot be retrieved. Our key selection protocol uses the node ID and some basic rotate and multiplication function to select the key for current data transmission. Because of this dynamic key selection, our approach identifies the replay attack, DoS attack and Sybil attack. Our simulation results shows that our security mechanism efficiently controls various attacks with lower resource requirements and the network resilience against node capture is substantially improved.

Author supplied keywords

Cite

CITATION STYLE

APA

Thiruppathy Kesavan, V., & Radhakrishnan, S. (2012). Multiple secret keys based security for wireless sensor networks. International Journal of Communication Networks and Information Security, 4(1), 68–76. https://doi.org/10.17762/ijcnis.v4i1.136

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free