High-Level Security Approach in Wireless Sensor Network using Cluster Based Dynamic Keying Technique

被引:0
作者
Ul Nisa, Khair [1 ,2 ]
Qureshi, Mujtaba Ashraf [1 ,3 ]
Ahmad, Aijaz [1 ,2 ]
机构
[1] Cluster Univ Srinagar, Dept Informat Technol, Srinagar, J&K, India
[2] SP Coll, Srinagar, India
[3] AAAM Coll, Srinagar, India
关键词
WSN; Network Security; CBSDKT; Cluster Head;
D O I
暂无
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
The security of a network relates to all the functionality, operating procedures and steps required to ensure an appropriate level of security and confidence for network-wide data transmission, access control and administrative policies and management policies to ensure the honesty, accessibility and privacy of data at the same time. In this method, cryptographic strategy CBSDKT is used to detect any infiltration attack during data transmission between wireless sensor networks (WSNs). Also, this research work presents the simulation results at/using different parameters which depicts/presents exceptional results which help to maintain Wireless Network Sensor transmission of data secure.
引用
收藏
页码:1523 / 1532
页数:10
相关论文
共 7 条
[1]   Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks [J].
Azarderskhsh, Reza ;
Reyhani-Masoleh, Arash .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
[2]  
Banihashemian S, 2010, INT CONF ADV COMMUN, P141
[3]   DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks [J].
Bellazreg, Ramzi ;
Boudriga, Noureddine .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014,
[4]  
Boubiche Djallel Eddine, 2012, INT J OFNETWORK SECU, V4, P35
[5]  
Boujelben M, 2009, 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, P131
[6]  
Boulis, 2011, CASTALIA SIMULATOR W
[7]  
Ould Amara Said, 2013, EDPACS: The EDP Audit, Control, and Security Newspaper, V47, P6, DOI 10.1080/07366981.2013.754207