-
Essay / Dynamic key management system to improve security in...
Related workThe key management problem is a more important problem in the field of sensors. Each sensor node is needed to transmit the node, then only the data is reached to the base station, so each sensor node within a group needs a key to transmit the data. While the attacker has entered and also gets full access to the sensor node, he is ready to hack the data, but he has to wait. Since the nodes do not own any of the keys at that time, during transmission only the nodes have access to the cluster head's keys. A cluster that has a variety of groups in the network and each group is specified using its name. All groups have the number of nodes necessary to transmit information across the network. Establishing pairwise keys between sensor nodes is even more difficult to manage. Attackers do not easily manage sensor nodes, they need to gain full access to the node and also attempt to gain access to the cluster. But the cluster will not allow to compromise the group and the cluster head will provide the duplicate data, if the attacker causes any problem to the sensor nodes. Recent advancements in wireless technology provide security from blocking attackers and must also eliminate attackers in the network. But in this article we provide the new technique to handle the attacker using duplicate data as backbone and also using dynamic key management in this system to ensure increased data security in wireless sensor network ( WSN). The attackers therefore cannot find the original data. They don't know that the original data is sent securely to the base station. The key activity of this paper is to avoid data loss in the network and also provide ...... middle of paper ...... mobile Install the replica in a wireless sensor network and authenticate -la with key distribution” (IJERT), ISSN: 2278-0181, Vol. 2 Issue 6, June 2013.[7]BJ Culpepper and HC Tseng, “Sinkhole Intrusion Indicators in MANET DSRs,” Proc. First Conf. International. Broadband Networks (Broad-Nets '04), pp.681-688, October 2004.[8]Y. Tirta, Z. Li, Y. Lu, and S. Bagchi, “Efficient collection of sensor data in remote fields using mobile collectors,” Proc. 13th Conf. international. Comm. computer science. And Networks (ICCN '04), October 2004.[9]A. Rasheed and R. Mahapatra, “An efficient key distribution scheme for establishing pairwise keys with a mobile receiver in distributed sensor networks,” Proc. IEEE 27th International Performance Computing and Comm. Conf. (IPCCC '08), pp. 264-270, December 2008.[10]L. Lamport, “Password Authentication with Insecure Communication,” Comm. ACM, vol. 24, no. 11, pp. 770-772, November. 1981.