Analyzing & Identifying the Superlative Keying Protocol to Support Sensor Networking

The sensor networks like mobile sensor networks or the network that are built in a hurry are deployed in whimsical and undersigned configuration. For this reason, the sensor in such a network may become eventually adjacent to any other sensor in the network. In order to make a communication between every pair of adjacent sensors, in a secure way in such an arbitrary network, each sensor, let x in the network be in need to store n-1 symmetric keys that sensor x shares with all the other sensors where n is the number that represents the count of the sensors in the network.

Provided by: IJCER Topic: Mobility Date Added: Oct 2012 Format: PDF

Find By Topic