International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 05 | May-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 226 EKM-CI: Effectual key administration in dynamic wireless sensor network Shalini M S 1 , Hemanth S R 2 1 Karnataka, India 2 Associate Professor, Department of Computer Science and Engineering, Maharaja Institute of Technology, Mysore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose a certificateless-effective key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol also supports efficient key revocation for compromised nodes and minimizes the impact of a node compromise on the security of other communication links. A security analysis of our scheme shows that our protocol is effective in defending against various attacks. We implement CL-EKM in Contiki OS and simulate it using Cooja simulator to assess its time, energy, communication, and memory performance. Key Words: Key Management; Wireless Sensor; Cola machine; node mobility; 1. INTRODUCTION Autonomous robots are mostly used in many industrial, agricultural and military applications. Research in the path planning is one of the most important aspects in mobile robot domain. Path planning for a mobile robot need to find a collision free path in dynamic environment from the specified start location to a desired (target) goal location while satisfying certain optimization conditions. Existing path planning methods like graphical methods such as visibility graph, the potential field and the cell decomposition are designed for dynamic environments, in which there are dynamic obstacles. In practical systems such as Marine Science Research [4], Mobile Robots in Industry, and military combat applications, robots usually face dynamic environments where both moving and stationary obstacles exist. The concept of Rapidly-exploring Random Tree (RRT) as a randomized data structure (graph) is designed for a broad class of path planning problems [2]. Now days, wireless sensor networks (WSNs) are widely used in wide variety of applications. So to improve security for WSNs and to protect the WSNs from various attack uses key management which is an effective way. A suitable encryption key protocol are used to secure data and communication .In this paper, a certificateless effective key management (CL- EKM)[1] protocol is proposed to have a secure communication in dynamic WSNs characterized by node mobility. The CL-EKM protocol supports an economical communication for key updates and manages once a node joins or leaves a cluster and ensures forward and backward key secrecy. A protocol also supports key revocation for compromised nodes and to minimize the impact of a node compromise on the protection of alternative communication links. The security analysis states that CL-EKM protocol is effective in defensive against varied attacks. 2. LITERATURE SURVEY I.-H.Chuang, W.-T.Su, C.-Y. Wu,et al,[1] proposed a two layered dynamic key management(TDKM) approach for cluster-based WSN (CWSN).To show the efficiency, TDKM is compared with other key management protocols . Key generation overhead, network security, and secured data transmission overhead in CWSN are analyzed by finding the relationship between the number of groups and system performance. M. Rahman and K. El-Khatib[2] proposed a novel key agreement protocol which is based on pairing- based cryptography over an elliptic curve. With the help this protocol, if any two nodes want to communicate independently can use the same secret key by using pairing and identity-based encryption properties. The proposed technique reduces the key space of a node and also shows that it is robust against various attacks such as masquerade attacks, reply attacks, and message manipulation attacks. S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito[3] presented an effective mutual authentication and key establishment scheme for heterogeneous sensor networks which includes numerous mobile sensor nodes and only a few more powerful fixed sensor nodes. The outcome of this approach is less communication overhead during authentication and key establishment and as better network resilience against mobile nodes attacks compared to other approaches for authentication and key establishment. X. Zhang, J. He, and Q. Wei[4] proposed an energy-efficient distributed deterministic key management scheme (EDDK).With the help of this scheme pairwise keys and cluster keys of sensor nodes are well established as well as maintained securely and communication overhead is also less. They also made use of elliptic curve digital signature algorithm in EDDK, which provided the support for the establishment of pairwise keys and local cluster keys under the node mobility scenario. M.Tech 4th sem, Department of Computer Science and Engineering, Maharaja Institute of Technology, Mysore,