2 research outputs found

    Polynomial Based Dynamic Key Management for Secure Cluster Communication in Wireless Mobile Sensor Network

    Get PDF
    For inter and intra cluster communication, member nodes jointly build a mutual session key called cluster key to allow secure communication. Most existing schemes for cluster key management use messages exchange among the member nodes within a cluster for the new cluster key establishment when a node leaves or joins a cluster. This causes significant communication and computation costs. Furthermore, the secure distribution of cluster keys among member nodes in frequently changing environments is a difficult task without encryption and decryption operations. For secure cluster key management, we utilized polynomial (P) to accomplish effective intra-cluster key management and produced polynomial for making an inter-cluster key distribution. The main contribution is to generate polynomials and broadcast to nodes whenever a change occurs in a network or demanding nodes for secure key management. The presented scheme supports scalability for an increasing number of nodes using polynomials. The proposed scheme increases the lifetime of the network by decreasing the key pool size

    Secure Cluster-Head Selection Algorithm Using Pattern for Wireless Mobile Sensor Networks

    Get PDF
    Selecting a cluster head (CH) in wireless mobile sensor network is a crucial task. Numerous algorithms have been presented for this purpose in recent literature. In these algorithms, all nodes are permitted to contend in CH selection process regardless of their less resource. This meaningless participation of ineligible nodes in the CH selection process causes unnecessary communication cost. Similarly the use of real data for CH selection increases communication cost. Additionally, no one algorithm has focus in security aspect of CH selection process. In this article Pattern Based secure CH Selection algorithm has been presented. This algorithm filters the ineligible nodes, puts them to sleep mode thereby restricting them from not participating in the CH selection process. Additionally the uses of pattern instead of real data in CH selection decrease communication cost and increase security of CH selection process. The simulation results show the improvement in lifetime and enhancement in security of CH selection
    corecore