Abstract
Wireless Sensor networks are finding revolutionary applications in 24x7 unattended monitoring remotely. Such randomly deployed sensor nodes (SNs) need to send data to a central station, commonly known as base station (BS). SNs have limited energy resources and all possible attempts should be exerted to minimize energy consumption. But, maintaining secured communication poses additional challenges. This paper deals with a novel mechanism in establishing shared symmetric key between any two adjacent SNs by utilizing a 2-D matrix based key pre-distribution scheme between SNs. Versatility of this scheme is illustrated and enhanced resilency is observed in key distribution system. The use of multivariate polynomial is explored to have hierarchical authentication scheme between the BS and SNs be delegating the responsibility to cluster heads.
Keywords: Authentication, Bivariate polynomial, Clustering, Encryption, Energy consumption, Key pool, Resiliency, Symmetric key, Transducers.
Graphical Abstract
International Journal of Sensors, Wireless Communications and Control
Title:Secured Communication and Authentication in Wireless Sensor Networks
Volume: 5 Issue: 1
Author(s): Dharma P. Agrawal
Affiliation:
Keywords: Authentication, Bivariate polynomial, Clustering, Encryption, Energy consumption, Key pool, Resiliency, Symmetric key, Transducers.
Abstract: Wireless Sensor networks are finding revolutionary applications in 24x7 unattended monitoring remotely. Such randomly deployed sensor nodes (SNs) need to send data to a central station, commonly known as base station (BS). SNs have limited energy resources and all possible attempts should be exerted to minimize energy consumption. But, maintaining secured communication poses additional challenges. This paper deals with a novel mechanism in establishing shared symmetric key between any two adjacent SNs by utilizing a 2-D matrix based key pre-distribution scheme between SNs. Versatility of this scheme is illustrated and enhanced resilency is observed in key distribution system. The use of multivariate polynomial is explored to have hierarchical authentication scheme between the BS and SNs be delegating the responsibility to cluster heads.
Export Options
About this article
Cite this article as:
P. Agrawal Dharma, Secured Communication and Authentication in Wireless Sensor Networks, International Journal of Sensors, Wireless Communications and Control 2015; 5 (1) . https://dx.doi.org/10.2174/2210327905999150521105858
DOI https://dx.doi.org/10.2174/2210327905999150521105858 |
Print ISSN 2210-3279 |
Publisher Name Bentham Science Publisher |
Online ISSN 2210-3287 |

- Author Guidelines
- Bentham Author Support Services (BASS)
- Graphical Abstracts
- Fabricating and Stating False Information
- Research Misconduct
- Post Publication Discussions and Corrections
- Publishing Ethics and Rectitude
- Increase Visibility of Your Article
- Archiving Policies
- Peer Review Workflow
- Order Your Article Before Print
- Promote Your Article
- Manuscript Transfer Facility
- Editorial Policies
- Allegations from Whistleblowers
- Announcements