EconPapers    
Economics at your fingertips  
 

Enhancing the connectivity and resiliency of random key pre-distribution schemes for wireless sensor network

Vipin Kumar () and Navneet Malik ()
Additional contact information
Vipin Kumar: Lovely Professional University
Navneet Malik: Lovely Professional University

International Journal of System Assurance Engineering and Management, 2022, vol. 13, issue 1, No 10, 92-99

Abstract: Abstract A wireless sensor network is a prime arrangement to collect the data from different activities where human interaction is limited, like far fulling areas like the deep sea, volcano, and hostile regions. A small sensor collects the data and sends it to the sink. Data is sent from sensors to a base station in an unprotected area using multi-hop connections. Security of this data is very much crucial in some applications like military operations. When two sensors exchange the information, there must be an efficient method to authenticate the two parties to ensure that data is coming from the correct source. A malicious and compromised node may route the data wrongly and disturb the working of the network. So, the security of these networks becomes an essential task. For security, purpose nodes collect the data and encrypt the data before sending and decrypt the data after receiving. This encryption or decryption and node authentication process must be very efficient and must use minimum resources because sensors are battery-operated and have minimal storage and processing power. Every authentication and encryption/decryption method require a set of keys on which communication entities must agree. A sensor network has thousands of nodes, and distributing the keys to all these nodes is a non-trivial task. This paper investigates the keys required for networks with a large number of nodes and analyses the relationship between resiliency and connectivity. In this paper we present a technique to improve the connectivity and resiliency in random key distribution, using a new random deployment method.

Keywords: Wireless network; Security; Authentication; Key management; Applications and performance; Cryptography; Connectivity; Energy efficient; WSN attacks; Resiliency; Random deployment (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s13198-021-01265-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:13:y:2022:i:1:d:10.1007_s13198-021-01265-x

Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198

DOI: 10.1007/s13198-021-01265-x

Access Statistics for this article

International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar

More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:ijsaem:v:13:y:2022:i:1:d:10.1007_s13198-021-01265-x