CQUniversity
Browse

Secure key management protocol for wireless sensor network

Download (1.16 kB)
conference contribution
posted on 2017-12-06, 00:00 authored by M Alkhalaileh, M Mestarihi, I Mohamad
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a completely secure environment. This is precisely what is considered as a challenging problem which needs a lot of work and effort. Many wireless sensor network applications are used in gathering information for military, industrial, and environmental issues. These sensors for example may be deployed in hostile when they collect precise information about the enemy. This deployment introduces several security issues to apply to the sensor network. This encourages researchers to start developing dependable routing protocols, which are suitable for the network sensor. In other words, if the sensors are deployed in a hostile area without protection against attacks, the enemy can attack the network and may start using it for his/her own benefit. Therefore, achieving secure communication paradigm for sensor networks becomes an important issue. This paper develops a new simulator that is used for key management in WSN depending on the development of two other protocols: Trusted BS and pair wise key redistributions. The results show that our protocol outperforms a couple wise key redistributions, and slightly outperforms trusted base station.

History

Parent Title

Proceedings of the 24th International Business Information Management Association Conference (IBIMA 2014) : Crafting Global Competitive Economies : 2020 Vision Strategic Planning & Smart Implementation, November 6-7, 2014, Milan, Italy

Start Page

804

End Page

812

Number of Pages

9

Start Date

2014-01-01

ISBN-13

9780986041938

Location

Milan, Italy

Publisher

International Business Information Management Association

Place of Publication

Norristown, PA, USA

Peer Reviewed

  • Yes

Open Access

  • No

External Author Affiliations

AL-Jouf University; Higher Education Division (2013- ); Najran University; TBA Research Institute;

Era Eligible

  • Yes

Name of Conference

International Business Information Management Association Conference

Usage metrics

    CQUniversity

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC