sorry, we can't preview this file

...but you can still download cqu_12441+SOURCE1+SOURCE1.2
cqu_12441+SOURCE1+SOURCE1.2 (1.16 kB)

Secure key management protocol for wireless sensor network

Download (1.16 kB)
conference contribution
posted on 06.12.2017, 00:00 by M Alkhalaileh, M Mestarihi, I Mohamad
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a completely secure environment. This is precisely what is considered as a challenging problem which needs a lot of work and effort. Many wireless sensor network applications are used in gathering information for military, industrial, and environmental issues. These sensors for example may be deployed in hostile when they collect precise information about the enemy. This deployment introduces several security issues to apply to the sensor network. This encourages researchers to start developing dependable routing protocols, which are suitable for the network sensor. In other words, if the sensors are deployed in a hostile area without protection against attacks, the enemy can attack the network and may start using it for his/her own benefit. Therefore, achieving secure communication paradigm for sensor networks becomes an important issue. This paper develops a new simulator that is used for key management in WSN depending on the development of two other protocols: Trusted BS and pair wise key redistributions. The results show that our protocol outperforms a couple wise key redistributions, and slightly outperforms trusted base station.

History

Parent Title

Proceedings of the 24th International Business Information Management Association Conference (IBIMA 2014) : Crafting Global Competitive Economies : 2020 Vision Strategic Planning & Smart Implementation, November 6-7, 2014, Milan, Italy

Start Page

804

End Page

812

Number of Pages

9

Start Date

01/01/2014

ISBN-13

9780986041938

Location

Milan, Italy

Publisher

International Business Information Management Association

Place of Publication

Norristown, PA, USA

Peer Reviewed

Yes

Open Access

No

External Author Affiliations

AL-Jouf University; Higher Education Division (2013- ); Najran University; TBA Research Institute;

Era Eligible

Yes

Name of Conference

International Business Information Management Association Conference

Usage metrics

CQUniversity

Exports