Three-Tier Security Scheme for Wireless Sensor Networks: Research Perspective - Couverture souple

Maheswari, P. Uma; Kumar, P. Ganesh

 
9783659667978: Three-Tier Security Scheme for Wireless Sensor Networks: Research Perspective

Synopsis

This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors. To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis, we show that our security framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

Présentation de l'éditeur

This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors. To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis, we show that our security framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme.

Biographie de l'auteur

Mrs. P.Uma Maheswari, Assistant Professor in the Department of Computer Applications at Anna University Regional Office Madurai, INDIA. She possess Eight plus years of experience in teaching as well as in research. Her research interests include Wireless Networks, Network Security, and Optimization Techniques.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.