An Effective Time Management Schema in WSNs

Download Now Date Added: Jul 2011
Format: PDF

WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and Existing security designs mostly provide a hop-by-hop security paradigm. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as random node capture attack, report disruption attacks and selective forwarding attacks. The authors come up with a new concept that provide end-to-end security framework in which secret keys are generated and each node stores a few keys based on Time Schema. The proposed multifunctional key management framework assures both node-to-sink and node-to-node authentication along the report forwarding routes.