Wireless Sensor Network Security Key Management

Wireless sensor networks play a vital role in the fields of Healthcare, Defence and widespread internet. The main drawback of the present WSNs is security measures. Attacks can be made on networks which causes high risks. They can be rectified by employing secure protocols and mechanisms. Node compromise attacks can be eradicated using Dynamic key management and effective key management. This improves the scalability of the network. Literature Review Major threats in WSNs are attacks and misbehaviours like routing, data forwarding, medium access etc.

These are reduced by proposing MANET protocol. WSNs uses small nodes which limit the amount of information to be collected and disseminated in applications. To overcome this Defence methods are analysed based on networking protocol layers. Mobile and ad-hoc services also use WSNs which limit the resource in communication capabilities. Several encryption key mechanisms are proposed to eradicate the limitations. IoT is made secure by creating a secure channel between the internet host and sensor node by key management mechanism. Problems like time based and location based mobile attacks are eradicated by secure privacy preserving key management. In medical field the identity and location privacy of the patients are preserved using Blom’s symmetric key mechanism. These techniques overcome the various limitations of wireless body area networks (WBANs).

The most important criteria like patient’s data privacy and confidentiality is majorly addressed. The dynamic behaviour and extremely constrained nature of WSN does not allow the efficient use of key management mechanism. Light weight key management solutions are introduced. The nodes vulnerable to attacks are majorly deployed in hostile environments. By using Key revocation this can be minimised. Light weight three factor authentication and key agreement protocols have been developed in order to avoid the tracking attacks and user un traceability. WSNs widely used in the healthcare sector reduces the need of a caretaker, thereby monitoring the patients. Implantable medical devices are used for monitoring and treating various medical conditions. Based on the merits and limitations various IMD, security schemes are been analysed for supporting emergency access and implemented. WBANS is one of the vital areas in medical field as it looks up security and privacy issues in the corresponding sector. To manage the threats from internet a protocol named q-s- composite is proposed. The issues, security and architecture are discussed to make them efficient in IoT.

Wider network coverage and accurate service than static wireless sensor networks (WSNs) is facilitated by dynamic WSNs. several security attacks are addressed. Key sharing probability and high network scalability is maintained by preloading the nodes) (AbstractLiterature Review) (Expected OutcomesBy implementing various techniques like Energy efficient distributed deterministic key management, Exclusion basis system key management and Certificateless effective key management the attacks and security problems are removed. By using secure protocols sensor node problems will be rectified and give us an error free transmission of data. Fields like healthcare can maintain high privacy of their patients’ vital stats, WSNs usage in the military can become more effective with these security implementations. Wireless sensor networks could add even more benefits by overcoming their security defects. ) (Significance (Rational)Wireless sensor networks are widely used in Military, Ecological and health related areas. In the military field, the enemy movement monitoring is carried out using WSN. Use of WSN with MANNA management architecture reduces energy consumption, computation faults caused by several nodes. Security issues in WSNs are highly reduced by using Cryptography and key management. These two techniques eradicate attacks on the networks. Several key management schemes have been developed to overcome the resource constraints in WSN by implementing key establishment techniques. ) (Connection to the current body of knowledgeSince wireless sensor networks are used in variety of applications, different key management techniques are proposed. One of them is CL-EKM i. e. , Certificateless-Effective key management protocol. This protocol was developed for secure communications.

The forward and backward key secrecy are ensured by CL-EKM. This minimises the overall impacts caused by the nodes. This is very effective as it defends against serious attacks. This addresses my first research question. The flaws in the existing key management technique is rectified by introducing energy efficient distributed deterministic key management scheme. This is resource constrained and this mechanism does not depend on infrastructure. Thus, the storage is effectively managed as this is not dependent on infrastructure. This addresses my second research question. Wireless sensor networks are mostly used in battlefields, surveillance, monitoring environment, target tracking systems etc. Due to these wide applications the sensor nodes are prone to node compromise attacks. This can be rectified by adopting dynamic key management. The sensor nodes are resource constrained and this hinders the use of dynamic key management techniques. To overcome this several management mechanisms are proposed.

Due to resource limitations, the key management schemes become a challenging task for wireless sensor networks. The network scalability becomes a main challenge for WSN. The proposed work focuses on new scalable key management scheme with highly secure network scalability and key sharing probability. This shows the improvement overall performance. This addresses my third research question. Data confidentiality and authenticity is one of the critical aspects in any filed. Since Wireless sensor networks are used in border control, battle field, surveillance etc the network level attacks are greatly addressed. Moreover memory, energy and computational capabilities are constrained which limits the security solution designs. The proposed work mainly deals with managing the encryption keys in clustered WSNs. Exclusion Basis Systems (EBS) key management scheme was proposed. This is called as SHELL because it addresses the scalability, hierarchical, efficient, location-aware and light weight. This scheme enhances the network security. The consumption of memory and energy are minimised. It also minimises the collusion among the sensor nodes.

18 May 2020
close
Your Email

By clicking “Send”, you agree to our Terms of service and  Privacy statement. We will occasionally send you account related emails.

close thanks-icon
Thanks!

Your essay sample has been sent.

Order now
exit-popup-close
exit-popup-image
Still can’t find what you need?

Order custom paper and save your time
for priority classes!

Order paper now