Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks

来源 :中国通信 | 被引量 : 0次 | 上传用户:pyw520
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node’s average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node’s average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat o r addition of malicious nodes from the network. By simulation, it is proved that the proposed node provides efficient security with reduced energy consumption during node mobility.
其他文献
In this paper, we propose a Packet Cache-Forward(PCF) method based on improved Bayesian outlier detection to eliminate out-of-order packets caused by transmissi
绝大多数媒体都有4个基本的经济特性:第一个特性是公共物品性。所谓的“公共物品”,是指某人使用该产品或从该产品中受益,并不影响他人对相同产品的使用或受益;第二个是外部性。
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
枕头放放平,  花被盖盖好。  小枕头,小花被,  跟我一起睡午觉, 本文为全文原貌 未安装PDF浏览器用户请先下载安装 原版全文
目的显著物体检测的目标是提取给定图像中最能吸引人注意的物体或区域,在物体识别、图像显示、物体分割、目标检测等诸多计算机视觉领域中都有广泛应用。已有的基于局部或者全局对比度的显著物体检测方法在处理内容复杂的图像时,容易造成检测失败,其主要原因可以总结为对比度参考区域设置的不合理。为提高显著物体检测的完整性,提出背景驱动的显著物体检测算法,在显著值估计和优化中充分利用背景先验。方法首先采用卷积神经网络
本文详细介绍了1Z-135型多功能微耕机的结构和各项基本情况,分析了微耕机的安装与调整并提出了微耕机作业时的注意事项,为以后使用和研究1Z-135型多功能微耕机提供借鉴。
随着社会的发展,时代的进步,静态影像作品属于视觉上传达的范畴,静态影像作品在平面艺术设计中的应用对平面产品的开发和利用有着非常重要的作用。大量的静态影像作品被应用
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
期刊
在宏观经济运行增速明显放缓,经济下行压力和风险依然较大的情况下,江阴海达橡塑股份有限公司发挥多领域配套战略的优势,持续加大研发和市场营销投入力度,在已进入的领域中坚
期刊
伴随工业化的进程,农业就业份额不断下降,但农业内部产业间的调整仍然可以转移相当部分劳动力.其次非农产业吸纳农村剩余劳动力就业能力上升,其中以工业为代表的第二产业是吸