Visible to the public Performance Analysis of Cluster based Secured Key Management Schemes in WSN

TitlePerformance Analysis of Cluster based Secured Key Management Schemes in WSN
Publication TypeConference Paper
Year of Publication2019
AuthorsManikandan, G., Suresh, K., Annabel, L. Sherly Puspha
Conference Name2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)
Keywordsasymmetric key sets, CBWSN, cluster-based wireless sensor networks, clustering, composability, confinement, cryptography, Cyber-physical systems, encoded data, information records, Information security, Key Management and Secure Transmission, key management framework, key management schemes, large scale networks, mystery keys, privacy, pubcrawl, Resiliency, Routing, secure clusters, secure information transmission, secure transmission, security holes, security of data, symmetric sets, telecommunication network management, transmitted information, Wireless sensor networks
AbstractWireless Sensor Networks (WSNs) utilizes many dedicated sensors for large scale networks in order to record and monitor the conditions over the environment. Cluster-Based Wireless Sensor Networks (CBWSNs) elucidates essential challenges like routing, load balancing, and lifetime of a network and so on. Conversely, security relies a major challenge in CBWSNs by limiting its resources or not forwarding the data to the other clusters. Wireless Sensor Networks utilize different security methods to offer secure information transmission. Encryption of information records transferred into various organizations thus utilizing a very few systems are the normal practices to encourage high information security. For the most part, such encoded data and also the recovery of unique data depend on symmetric or asymmetric key sets. Collectively with the evolution of security advances, unfruitful or unauthorized endeavors have been made by different illicit outsiders to snip the transmitted information and mystery keys deviously, bother the transmission procedure or misshape the transmitted information and keys. Sometimes, the limitations made in the correspondence channel, transmitting and receiving devices might weaken information security and discontinue a critical job to perform. Thus, in this paper we audit the current information security design and key management framework in WSN. Based on this audit and recent security holes, this paper recommends a plausible incorporated answer for secure transmission of information and mystery keys to address these confinements. Thus, consistent and secure clusters is required to guarantee appropriate working of CBWSNs.
DOI10.1109/ICSSIT46314.2019.8987740
Citation Keymanikandan_performance_2019