Academy & Industry Research Collaboration Center
Recent developments on Wireless Sensor Networks have made their application in a wide range such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on. Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh, unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves the authorization of admittance to data in a network. The problem of authentication and pair wise key establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks. In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a small fraction of sensor nodes by the attacker.