Open Access Open Access  Restricted Access Subscription or Fee Access

Roaming in Chain Oriented Sensor Networks

L. Sujihelen, Dr.C. Jaya Kumar

Abstract


Wireless Sensor Networks consists of collection of Sensor Nodes equipped with radio transceivers, base station etc. The Sensor nodes are open, to protect it many key distribution schemes have been developed. WSN technology develops many applications coming up which requires a node to roams to other WSNs. When a node roams from chain oriented Sensor networks to other CWSN (chain oriented WSN), its routing path and neighborhood keep changing. To provide a security the moving sensor node should be authenticated and to establish a key for secure communication.

Keywords


Sensor nodes,physical protection,Base Station

Full Text:

PDF

References


F.Hess, "Efficient identity based signature schemes based on pairings,”in Proc. SAC,, St.John's,Newfoundland,Canada,August2002.

D.Johnson and A.Menezes,"The elliptic curve digital signature algorithm ecdsa", Dept.of C.O, University of Waterloo, Canada, Technical Report CORR99-34,August 1999, updated 2000/02/04.

S. Choi, V. Sarangan, J. Thomas, S. Radhakrishnan,”Secure Access Control Protocol for WSNs with inter-network roaming”, 35th Annual IEEE Conference on Local Computer Networks, Colorado, 2010

Mamun, Q.E.K.; Ramakrishnan, S.,” SecCOSEn – A Key Management Scheme for Securing Chain Oriented Sensor Networks” IEEE proc. of the 6th Annual Research Conference on Communication Networks and Services, pp: 584 - 592 ,May 2008

A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast authentication protocol,” RSA CryptoBytes, vol. 5, 2002.

Yun Zhou; Yuguang Fang,” BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks”, IEEE proc. On Global Telecommunications Conference, San Francisco, 2006.

Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bede Liu and Jinyun Zhang,”Fast authenticated key establishment protocols for self-organizing sensor networks”, Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications,New York,2003

Holohan, E.,Schukat, M.,” Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor Networks”,proceedings of 9th IEEE International Symposium on Network Computing and Applications (NCA), Cambridge ,2010

D. Liu, P. Ning and R. Li, “Establishing pairwise Keys in distributedsensor networks,” ACM Transactions on Information and System Security,vol. 8, pp. 41–77, Feb 2005.

L. Eschenauer and V. Gligor, “A Key Management Scheme for DistributedSensor Networks,” in Proceedings of the 9th ACM Conferenceon Computer and Communications Security (CCS ’02), pp. 41–47, 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.