sorry, we can't preview this file

...but you can still download cqu_12441+SOURCE1+SOURCE1.2
cqu_12441+SOURCE1+SOURCE1.2 (1.16 kB)

Secure key management protocol for wireless sensor network

Download (1.16 kB)
conference contribution
posted on 06.12.2017, 00:00 by M Alkhalaileh, M Mestarihi, I Mohamad
There are many protocols used in wireless sensor network (WSN), but few of them provide us with a completely secure environment. This is precisely what is considered as a challenging problem which needs a lot of work and effort. Many wireless sensor network applications are used in gathering information for military, industrial, and environmental issues. These sensors for example may be deployed in hostile when they collect precise information about the enemy. This deployment introduces several security issues to apply to the sensor network. This encourages researchers to start developing dependable routing protocols, which are suitable for the network sensor. In other words, if the sensors are deployed in a hostile area without protection against attacks, the enemy can attack the network and may start using it for his/her own benefit. Therefore, achieving secure communication paradigm for sensor networks becomes an important issue. This paper develops a new simulator that is used for key management in WSN depending on the development of two other protocols: Trusted BS and pair wise key redistributions. The results show that our protocol outperforms a couple wise key redistributions, and slightly outperforms trusted base station.


Parent Title

Proceedings of the 24th International Business Information Management Association Conference (IBIMA 2014) : Crafting Global Competitive Economies : 2020 Vision Strategic Planning & Smart Implementation, November 6-7, 2014, Milan, Italy

Start Page


End Page


Number of Pages


Start Date





Milan, Italy


International Business Information Management Association

Place of Publication

Norristown, PA, USA

Peer Reviewed


Open Access


External Author Affiliations

AL-Jouf University; Higher Education Division (2013- ); Najran University; TBA Research Institute;

Era Eligible


Name of Conference

International Business Information Management Association Conference

Usage metrics