International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 05 | May-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 226
EKM-CI: Effectual key administration in dynamic wireless sensor
network
Shalini M S
1
, Hemanth S R
2
1
Karnataka, India
2
Associate Professor, Department of Computer Science and Engineering, Maharaja Institute of Technology, Mysore,
Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Recently, wireless sensor networks (WSNs) have
been deployed for a wide variety of applications, including
military sensing and tracking, patient status monitoring,
traffic flow monitoring, where sensory devices often move
between different locations. Securing data and
communications requires suitable encryption key protocols. In
this paper, we propose a certificateless-effective key
management (CL-EKM) protocol for secure communication in
dynamic WSNs characterized by node mobility. The CL-EKM
supports efficient key updates when a node leaves or joins a
cluster and ensures forward and backward key secrecy. The
protocol also supports efficient key revocation for
compromised nodes and minimizes the impact of a node
compromise on the security of other communication links. A
security analysis of our scheme shows that our protocol is
effective in defending against various attacks. We implement
CL-EKM in Contiki OS and simulate it using Cooja simulator to
assess its time, energy, communication, and memory
performance.
Key Words: Key Management; Wireless Sensor; Cola
machine; node mobility;
1. INTRODUCTION
Autonomous robots are mostly used in many industrial,
agricultural and military applications. Research in the path
planning is one of the most important aspects in mobile
robot domain. Path planning for a mobile robot need to find
a collision free path in dynamic environment from the
specified start location to a desired (target) goal location
while satisfying certain optimization conditions. Existing
path planning methods like graphical methods such as
visibility graph, the potential field and the cell
decomposition are designed for dynamic environments, in
which there are dynamic obstacles. In practical systems such
as Marine Science Research [4], Mobile Robots in Industry,
and military combat applications, robots usually face
dynamic environments where both moving and stationary
obstacles exist. The concept of Rapidly-exploring Random
Tree (RRT) as a randomized data structure (graph) is
designed for a broad class of path planning problems [2].
Now days, wireless sensor networks (WSNs) are widely used
in wide variety of applications. So to improve security for
WSNs and to protect the WSNs from various attack uses key
management which is an effective way. A suitable encryption
key protocol are used to secure data and communication .In
this paper, a certificateless –effective key management (CL-
EKM)[1] protocol is proposed to have a secure
communication in dynamic WSNs characterized by node
mobility. The CL-EKM protocol supports an economical
communication for key updates and manages once a node
joins or leaves a cluster and ensures forward and backward
key secrecy. A protocol also supports key revocation for
compromised nodes and to minimize the impact of a node
compromise on the protection of alternative communication
links. The security analysis states that CL-EKM protocol is
effective in defensive against varied attacks.
2. LITERATURE SURVEY
I.-H.Chuang, W.-T.Su, C.-Y. Wu,et al,[1] proposed a
two layered dynamic key management(TDKM) approach for
cluster-based WSN (CWSN).To show the efficiency, TDKM is
compared with other key management protocols . Key
generation overhead, network security, and secured data
transmission overhead in CWSN are analyzed by finding the
relationship between the number of groups and system
performance. M. Rahman and K. El-Khatib[2] proposed a
novel key agreement protocol which is based on pairing-
based cryptography over an elliptic curve. With the help this
protocol, if any two nodes want to communicate
independently can use the same secret key by using pairing
and identity-based encryption properties. The proposed
technique reduces the key space of a node and also shows
that it is robust against various attacks such as masquerade
attacks, reply attacks, and message manipulation attacks.
S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito[3]
presented an effective mutual authentication and key
establishment scheme for heterogeneous sensor networks
which includes numerous mobile sensor nodes and only a
few more powerful fixed sensor nodes. The outcome of this
approach is less communication overhead during
authentication and key establishment and as better network
resilience against mobile nodes attacks compared to other
approaches for authentication and key establishment. X.
Zhang, J. He, and Q. Wei[4] proposed an energy-efficient
distributed deterministic key management scheme
(EDDK).With the help of this scheme pairwise keys and
cluster keys of sensor nodes are well established as well as
maintained securely and communication overhead is also
less. They also made use of elliptic curve digital signature
algorithm in EDDK, which provided the support for the
establishment of pairwise keys and local cluster keys under
the node mobility scenario.
M.Tech 4th sem, Department of Computer Science and Engineering, Maharaja Institute of Technology, Mysore,