The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Wireless Sensor Networks(WSN) used in a variety of applications are usually unattended in nature and are highly susceptible to attacks such as eavesdropping, hardware tampering and false messages. For secure communication among the nodes, Secret key cryptography is used since it provides high security with low computing power. Existing key management schemes does not guarantee the level of security and network performance. To handle such problems, random seed distribution with transitory cluster key, a hybrid approach is used which is the integration of both random key distribution and the transitory master key. The security analysis shows that our approach provides enhanced resilience and better connectivity by establishing secure channels among the communicating nodes in a hierarchical clustered wireless sensor network. It over persuades the state-of-the-art protocols by providing always the best security features.

Keywords

Key Management, Secure Communication, Transitory Master Key, Wireless Sensor Network(WSN)
User