Open Access Open Access  Restricted Access Subscription Access

Secured Dynamic Clustering using Light Weighted Key Authentication for Target Tracking


Affiliations
1 VTU-RC, Dept. of ECE, PDACEG, Gulbarga, India
2 Dept. of ECE, PDACEG, Gulbarga, India
 

Many significant development in communicating with WSN has been developed, to secure the communication among the cooperative sensor nodes, a strong security concepts have been implemented, concerned to the object tracking in WSN, since the object is freely moving in and around the network so as the topology changes as the movement of object. Senor nodes are limited to energy usage and it is battery operated, energy and security is one of the major constrains in object tracking. In this paper, we propose a Light weighted key management technique for object tracking (LWKMOT) to secure the object moving in the network; dynamic clustering method is used to minimize the overhead of the network. In this system dynamic key generation system is adopted, the advantage of this method is to provide security protection, by generating different keys thus attacker cannot use the previous key to cheat.


Keywords

Dynamic Clustering, Key Management Scheme, Target Tracking, Wireless Sensor Networks.
User
Notifications
Font Size

  • Bhatti, S and Jie Xu, “Survey of Target Tracking Protocols using Wireless Sensor Network,” The Fifth International Conference on Wireless and Mobile Communications, pp. 110-115, Cannes/La Bocca, French Riviera, France, August 23-29, 2009.
  • Hua-Wen Tsai, Chih-Ping Chu and Tzung-Shi Chen, “Mobile Object Tracking In Wireless Sensor Networks,” Computer Communications, Volume 30, Issue 8, pp. 1811–1825, 2007.
  • Sung-Min Lee, Hojung Cha and Rhan Ha, “Energyaware location error handling for object tracking applications,” Computer Communication, volume 30, issue 7, pp. 1443-1450, 2007.
  • Yingqi Xu and Wang-Chien Lee, “On localized prediction for power efficient object tracking in sensor networks,” In Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops, pp. 434–439, Province RI, USA, 29-29 May, 2003.
  • G. Hoblos, M. Staroswiecki, A. Aitouche, “Optimal design of fault tolerant sensor networks,” In proceeding of: Control Applications, 2000. Proceedings of the 2000 IEEE International, pp. 467- 472, Anchorage, Alaska, USA September 25-27, 2000.
  • Ian Akyildiz and Mehmet Can Vuran, Wireless Sensor Networks. John Wiley and Sons, 2010.
  • E. E. Papalexakis, A. Beutel, and P. Steenkiste, “Network anomaly detection using co-clustering,” in Proc. 2012 Int. Conf. Advances in Social Networks Anal. and Mining (ASONAM 2012), 2012, pp. 403-410.
  • Lidong Zhou and Zygmunt J. Haas, ‘‘Securing Ad Hoc Networks’’, IEEE Network, November 1999.
  • Z. Cai, S. Ji, J.S. He, and A.G. Bourgeois, “Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks,” Proc. IEEE 32nd Int’l Conf. Distributed Computing Systems (ICDCS), pp. 245-254, 2012.
  • S. Ji and Z. Cai, “Distributed Data Collection and Its Capacity in Asynchronous Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 2113-2121, Mar. 2012.
  • S. Ji, R. Beyah, and Z. Cai, “Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 1035-1043, Mar. 2012.
  • Johnson C. Lee, Victor C. M. Leung, Kirk H. Wong, Jiannong Cao and Henry C. B. Chan, “Key Management Issues In Wireless Sensor Networks: Current Proposals and Future Developments”, IEEE Wireless Communications • October 2007.
  • In-Sook Lee, Zhen Fu, WenCheng Yang and MyongSoon Park, “An Efficient Dynamic Clustering Algorithm for Object Tracking in Wireless Sensor Networks,” DCDIS series B ,Vol.14(S2),Complex system and application-Modeling Coontrol and Simulation, pp. 14841488, 2007.
  • Fatemeh Deldar and Mohammad Hossien Yaghmaee, “Energy Efficient Prediction-based Clustering Algorithm for Target Tracking in Wireless Sensor Networks,” International Conference on Intelligent Networking and Collaborative Systems, Thessaloniki, Greece, pp. 315-318, 24-26 Nov. 2010
  • I.-H. Chuang, W.-T. Su, C.-Y. Wu, J.-P. Hsu, and Y.H. Kuo, “Twolayered dynamic key management in mobile and long-lived clusterbased wireless sensor networks,” in Proc. IEEE WCNC, Mar. 2007, pp. 4145–4150.
  • S. Agrawal, R. Roman, M. L. Das, A. Mathuria, and J. Lopez, “A novel key update protocol in mobile sensor networks,” in Proc. 8th Int. Conf. ICISS, vol. 7671. 2012, pp. 194–207.
  • X. Zhang, J. He, and Q. Wei, “EDDK: Energyefficient distributed deterministic key management for wireless sensor networks,” EURASIP J. Wireless Commun. Netw., vol. 2011, pp. 1–11, Jan. 2011.
  • Abdoulaye Diop “An Efficient and Secure Key Management Scheme for Hierarchical Wireless Sensor Networks” International Journal of Computer and Communication Engineering, Vol. 1, No. 4, November 2012.
  • D. Du, H. Xiong, and H. Wang, “An efficient key management scheme for wireless sensor networks,” Int. J. Distrib. Sensor Netw., vol. 2012, Sep. 2012, Art. ID 406254.

Abstract Views: 189

PDF Views: 0




  • Secured Dynamic Clustering using Light Weighted Key Authentication for Target Tracking

Abstract Views: 189  |  PDF Views: 0

Authors

D. Ramesh
VTU-RC, Dept. of ECE, PDACEG, Gulbarga, India
G. S. Biradar
Dept. of ECE, PDACEG, Gulbarga, India

Abstract


Many significant development in communicating with WSN has been developed, to secure the communication among the cooperative sensor nodes, a strong security concepts have been implemented, concerned to the object tracking in WSN, since the object is freely moving in and around the network so as the topology changes as the movement of object. Senor nodes are limited to energy usage and it is battery operated, energy and security is one of the major constrains in object tracking. In this paper, we propose a Light weighted key management technique for object tracking (LWKMOT) to secure the object moving in the network; dynamic clustering method is used to minimize the overhead of the network. In this system dynamic key generation system is adopted, the advantage of this method is to provide security protection, by generating different keys thus attacker cannot use the previous key to cheat.


Keywords


Dynamic Clustering, Key Management Scheme, Target Tracking, Wireless Sensor Networks.

References