An Efficient and Polynomial Based Key Distribution Approach for Wireless Sensor Networks

Download Now
Provided by: IJESIT
Topic: Security
Format: PDF
Wireless sensor networks are highly vulnerable to attacks because, it consists of various resources constrained devices and they communicate via wireless links. The most fundamental security problem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in the literature. Unfortunately, most of them are not resilient to nodes capture. This means that an attacker compromising a node can reuse the node's key materials to populate any part of the network with cloned nodes and new injected nodes.
Download Now

Find By Topic