Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network

被引:2
作者
Patel, Jaykumar Shantilal [1 ]
Chavda, Vijaykumar M. [2 ]
机构
[1] Chaudhari Tech Inst, MCA Dept, Opp ST Bus Depot,Sect 7, Gandhinagar, Gujarat, India
[2] NP Coll Comp Studies & Management Kadi, Kadi, Gujarat, India
来源
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING | 2014年 / 7卷 / 03期
关键词
Security constraint; Security vulnerability; Security attacks; Robust security; Key management; Public key; Elliptic Curve Cryptography (ECC);
D O I
10.14257/ijgdc.2014.7.3.03
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Encrypt message with strongly secure key which is known only by sending and recipient end is a significant aspect to acquire robust security in sensor network. The secure exchange of key between sender and receiver is too much difficult task in resource constraint sensor network. To achieve secure key agreement is challenging task for sensor network environment. The key management helps to maintain confidentiality of secret information from unauthorized users. It can also check the integrity of the exchanged message to verify the authenticity. This paper discusses various constraints available in sensor network, vulnerability through the existence of various security attacks at each layer for the communication and lastly the security requirement using the key management. Here we present the public key management using Elliptic Curve Cryptography to ensure robust security in sensor network environment.
引用
收藏
页码:23 / 28
页数:6
相关论文
共 21 条
  • [1] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
  • [2] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [3] Carman D.W., 2000, 00010 NAI LABS NETW
  • [4] Dinesh M., 2013, INT J COMPUTER SCI E, V2
  • [5] Du X., 2009, IEEE T WIRELESS COMM, V8
  • [6] GURA N, 2004, P 6 INT WORKSH CRYPT
  • [7] Jain M. K., 2011, INT J COMPUT INF SCI, V2, P62
  • [8] Jaykumar P., 2013, INT J COMPUTER SCI E, V2
  • [9] Karmakar S., 2013, INT J COMPUTER SCI E, V2
  • [10] MALAN D, 2004, P 1 IEEE INT C COMM