Shape-Area Model-based Key Management in Wireless Sensor Network

Abhishek Srivastava, Sudhanshu Tripathi, S. Dwivedi, Prinu C. Philip
{"title":"Shape-Area Model-based Key Management in Wireless Sensor Network","authors":"Abhishek Srivastava, Sudhanshu Tripathi, S. Dwivedi, Prinu C. Philip","doi":"10.1109/RAETCS.2018.8443947","DOIUrl":null,"url":null,"abstract":"Secure communication environment creation and an accurate data delivery to the end participants from the generation point are the major constraints in IoT based real time transportation and monitoring systems. The design of networking layer based on various routing and transmission protocols suffer from the attack problem. The generation of insider attacker not only damages the network structure, it also modifies the routing path and hacking the packet information. The integration of IoT with the WSN alleviates the issues due to the insider attackers. This paper proposes the novel shape model based on Localized Geometric Voronoi Hexagon (LGVH) algorithm and the secure communication using key management procedures. The consecutive process of key establishment, update and revocation provide the necessary resistance to the insider attackers. The LGVH algorithm provides the necessary location information regarding the Sensor Nodes (SN) predicts the coverage area for the dynamic environment. This paper expands the customizable WSN simulator tool based on NS2 simulator provides the detailed coverage area. The comparative analysis between the proposed model with the existing methods regarding the various parameters confirm the effectiveness and contributions to the real-time IoT applications.","PeriodicalId":131311,"journal":{"name":"2018 Recent Advances on Engineering, Technology and Computational Sciences (RAETCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Recent Advances on Engineering, Technology and Computational Sciences (RAETCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAETCS.2018.8443947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Secure communication environment creation and an accurate data delivery to the end participants from the generation point are the major constraints in IoT based real time transportation and monitoring systems. The design of networking layer based on various routing and transmission protocols suffer from the attack problem. The generation of insider attacker not only damages the network structure, it also modifies the routing path and hacking the packet information. The integration of IoT with the WSN alleviates the issues due to the insider attackers. This paper proposes the novel shape model based on Localized Geometric Voronoi Hexagon (LGVH) algorithm and the secure communication using key management procedures. The consecutive process of key establishment, update and revocation provide the necessary resistance to the insider attackers. The LGVH algorithm provides the necessary location information regarding the Sensor Nodes (SN) predicts the coverage area for the dynamic environment. This paper expands the customizable WSN simulator tool based on NS2 simulator provides the detailed coverage area. The comparative analysis between the proposed model with the existing methods regarding the various parameters confirm the effectiveness and contributions to the real-time IoT applications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于形状-区域模型的无线传感器网络密钥管理
安全的通信环境创建和从生成点向最终参与者的准确数据传输是基于物联网的实时运输和监控系统的主要制约因素。基于各种路由和传输协议的网络层设计受到攻击问题的困扰。内部攻击者的产生不仅会破坏网络结构,还会修改路由路径,对报文信息进行黑客攻击。物联网与无线传感器网络的融合缓解了内部攻击者带来的问题。本文提出了一种基于局部几何Voronoi六边形(LGVH)算法的新型形状模型,并采用密钥管理程序进行安全通信。密钥建立、更新和撤销的连续过程为内部攻击者提供了必要的抵抗。LGVH算法根据传感器节点SN (Sensor Nodes)提供必要的位置信息,预测动态环境的覆盖区域。本文扩展了基于NS2模拟器的可定制WSN模拟器工具,提供了详细的覆盖区域。将所提出的模型与现有方法在各种参数方面的对比分析,证实了该模型的有效性和对实时物联网应用的贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Interoperability Framework for Wireless Standards-Performance Analysis Design of an Advanced Five-Level Inverter for A Photovoltaic System A Novel Segmentation Technique for Urdu Type-Written Text Shape-Area Model-based Key Management in Wireless Sensor Network Load Frequency Control of Multi Area Interconnected Microgrid Power System using Grasshopper Optimization Algorithm Optimized Fuzzy PID Controller
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1