Academic Journals Database
Disseminating quality controlled scientific knowledge

A Key Re-Distribution and Authentication Based Technique for Secured Communication in Clustered Wireless Sensor Networks with Node Mobility

Author(s): Saswati Mukherjee | Matangini Chattopadhyay | Samiran Chattopadhyay | Amrita Saha

Journal: International Journal of Computer Networks & Communications
ISSN 0975-2293

Volume: 2;
Issue: 6;
Start page: 104;
Date: 2010;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Wireless sensor network | key distribution | isolation table and mobile nodes | intrusion detection.

Due to application of WSN in mission critical areas, secured message communication is veryimportant. We have attempted to present a methodology that ensures secured communicationamong nodes in a hierarchical Cluster Based WSN. Our scheme works when member sensornodes move from one Cluster Head (CH) to another. The proposed scheme is based on Key Redistributionduring node mobility and development of an Authentication Model to checkwhether the new node in a cluster is an intruder. We have carried out extensive simulationexperiments, which demonstrate the efficacy of the proposed scheme. The experiments suggestthat the number of message transmission in creases linearly with the number of mobile nodesduring key-redistribution when a node moves from one CH to another. We have seen that thedetection efficiency of the Authentication Model is 0.9 to 1 when tunable threshold value is 0.02and sensor nodes are sufficiently mobile.
Save time & money - Smart Internet Solutions     

Tango Rapperswil
Tango Rapperswil