posted on 2017-12-06, 00:00authored byM Alkhalaileh, M Mestarihi, I Mohamad
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a completely secure environment. This is precisely what is considered as a challenging problem which needs a lot of work and effort. Many wireless sensor network applications are used in gathering information for military, industrial, and environmental issues. These sensors for example may be deployed in hostile when they collect precise information about the enemy. This deployment introduces several security issues to apply to the sensor network. This encourages researchers to start developing dependable routing protocols, which are suitable for the network sensor. In other words, if the sensors are deployed in a hostile area without protection against attacks, the enemy can attack the network and may start using it for his/her own benefit. Therefore, achieving secure communication paradigm for sensor networks becomes an important issue. This paper develops a new simulator that is used for key management in WSN depending on the development of two other protocols: Trusted BS and pair wise key redistributions. The results show that our protocol outperforms a couple wise key redistributions, and slightly outperforms trusted base station.
History
Parent Title
Proceedings of the 24th International Business Information Management Association Conference (IBIMA 2014) : Crafting Global Competitive Economies : 2020 Vision Strategic Planning & Smart Implementation, November 6-7, 2014, Milan, Italy
Start Page
804
End Page
812
Number of Pages
9
Start Date
2014-01-01
ISBN-13
9780986041938
Location
Milan, Italy
Publisher
International Business Information Management Association