International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 39 - Issue 16 |
Published: February 2012 |
Authors: T. Lalitha, R. Umarani |
![]() |
T. Lalitha, R. Umarani . Cluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks. International Journal of Computer Applications. 39, 16 (February 2012), 40-43. DOI=10.5120/4908-7423
@article{ 10.5120/4908-7423, author = { T. Lalitha,R. Umarani }, title = { Cluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks }, journal = { International Journal of Computer Applications }, year = { 2012 }, volume = { 39 }, number = { 16 }, pages = { 40-43 }, doi = { 10.5120/4908-7423 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2012 %A T. Lalitha %A R. Umarani %T Cluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks%T %J International Journal of Computer Applications %V 39 %N 16 %P 40-43 %R 10.5120/4908-7423 %I Foundation of Computer Science (FCS), NY, USA
To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes.The security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink is not securely transmitted to the compromised node, it will lead to denial of service attack. In this paper, we propose a cluster based key management technique for authentication in wireless sensor networks. Initially, clusters are formed in the network and the cluster heads are selected based on the energy cost, coverage and processing capacity. By simulation results, we show that the proposed approach recovers the compromised node in the secured manner.