Analysis of Polynomial and Tame Pool Based Three-Tier Security Scheme for Wireless Sensor Networks

When the base station is long way from the sensor nodes the security strength is reduced. To overcome this problem the concept of Mobile Sink (MS) is introduced. Still there is a chance of major attack called as Mobile Sink replication attack. One method to eliminate this attack is using pool keys. Normally there are two common types of pool keys are available they are: polynomial pool keys and tame pool keys. In this paper, the authors study the three layer security using tame pool of keys and polynomial pool of keys.

Subscribe to the Daily Tech Insider Newsletter

Stay up to date on the latest in technology with Daily Tech Insider. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that will help you stay ahead of the game. Delivered Weekdays

Subscribe to the Daily Tech Insider Newsletter

Stay up to date on the latest in technology with Daily Tech Insider. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that will help you stay ahead of the game. Delivered Weekdays

Resource Details

Provided by:
International Journal of Innovations in Scientific and Engineering Research (IJISER)
Topic:
Enterprise Software
Format:
PDF