An Analytical Approach to Secured Routing Protocol Using Pre-Key Distribution in Clustered Wireless Sensor Networks

被引:0
作者
Kasirajan, S. S. [1 ]
Kumar, Manoj R. V. K. [1 ]
Manoj, S. B. [1 ]
Rajasoundaran, S. [1 ]
Narayanasamy, P. [1 ]
机构
[1] Anna Univ, Dept Informat Sci & Technol, CEG, Madras 25, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2014年
关键词
Wireless Sensor Networks; Clustered Network; style; security; key management; pre- key distribution;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military and from home to industry. In military areas highly confidential information are being exchanged between the sensor nodes. Wireless Sensor Networks being mobile in nature are prone to various kinds of attacks. An open problem today is to design a secured routing. This paper aims in providing secured routing using Pairwise Distribution in a clustered wireless sensor network to preserve anonymity of the network at the same time guaranteeing full security.
引用
收藏
页数:5
相关论文
共 13 条
[1]  
[Anonymous], P 13 MED C CONTR AUT
[2]  
Bechkit Walid, 2013, IEEE T WIRELESS COMM, V12
[3]   Security in wireless sensor networks [J].
Perrig, A ;
Stankovic, J ;
Wagner, D .
COMMUNICATIONS OF THE ACM, 2004, 47 (06) :53-57
[4]  
Proano Alejandro, 2012, PACKET HIDING METHOD
[5]  
RUJ S, 2013, IEEE T COMPUTERS, V62
[6]  
SEDJELMACI H, 2012, INTRUSION DETECTION
[7]  
Sedjelmaci Hichem, 2012, ACSIJ ADV COMPUTER S
[8]   An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks [J].
Shin, Sooyeon ;
Kwon, Taekyoung ;
Jo, Gil-Yong ;
Park, Youngman ;
Rhy, Haekyu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2010, 6 (04) :744-757
[9]  
Shin Sooyeon, 2010, P 2010 C DEP COMP CD, V6
[10]  
YU L, 2008, SPYMON HIDDEN NETWOR