RAP: A Resource Aware Protocol for Key Distribution in Wireless Sensor Networks

سال انتشار: 1386
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 2,528

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ISCC04_048

تاریخ نمایه سازی: 10 اسفند 1385

چکیده مقاله:

Given the importance of security for wireless sensor networks that reside in adversarial environments, a number of security policies have been introduced that use security keys to secure the network. They nonetheless incur unnecessary overheads due to inefficient management and distribution of keys. They are also mostly ignorant of the failures of the network constituents and the consequent whole or partial unavailability of the network. This paper presents a new resource-aware and secure key distribution solution that also enhances the availability of the network by increasing the lifetime of the base station, cluster heads, and cluster nodes. This has been mainly achieved by replacing critical nodes, namely, base station and cluster heads, which are going to fail or are prone to failure, with reserved nodes that continue to carry out the same responsibilities afterwards. Simulation results show higher availability and approximately 20-30% increase in efficiency under our protocol compared to networks running normal key distribution protocols.

کلیدواژه ها:

Wireless Sensor Networks Security ، Availability ، Key Management ، Key Distribution ، Reserved Node

نویسندگان

Mohsen Sharifi

Computer Engineering Department Iran University of Science and Technology, Tehran, Iran

Saeed Pourroostaei

Computer Engineering Department Iran University of Science and Technology, Tehran, Iran

Sedighian Kashi Saeed

Computer Engineering Department Iran University of Science and Technology, Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Embedded networked sensor systems, pp. 324-325. ACM Press, 2003. ...
  • L. Hu and D. Evans, ،$Secure Aggregation for Wireless Networks', ...
  • B. Przydatek, D. Song and A. Perrig, "SIA: Secure Information ...
  • N. Shrivastava, C. Buragohain, D. Agrawal and S. Suri, ، ...
  • En-Route Statistical؛، _ Ye, H. Luo, S. Lu and L. ...
  • A. R. Beresford and F. Stajano, «Location Privacy in Pervasive ...
  • Secure؛، T. Kaya, G. Lin, G. Noubir and A. Yilmaz, ...
  • S. Ganeriwal and M. Srivastava, ،، Reputati on-Based Framework for ...
  • Z. Liang and W. Shi, «Enforcing Cooperative Resource Sharing in ...
  • X. Wang, W. Gu, S. Chellappan, D. Xuan and T. ...
  • X. Wang, W. Gu, S. Chellappan, K. Schoseck and D. ...
  • M .A.Taleghan, A.Taherkordi and M.Sharifi, ،Fault- Tolerance Consi derations for ...
  • O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct ...
  • S. A. Camtepe, B. Yener, "Key Distribution Mechanisms for Wireless ...
  • Mohsen Sharifi, Saeed Pourroostaei and Saeed Sedighian Kashi, "Improving Availability ...
  • نمایش کامل مراجع