ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Protocol Design for Secure Communication in WSN

Journal: TEM JOURNAL - Technology, Education, Management, Informatics (Vol.6, No. 2)

Publication Date:

Authors : ; ; ;

Page : 192-204

Keywords : User authentication; cryptanalysis; Protocol design; message authentication; security; wireless sensor networks.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless sensor networks are widely used in military applications, monitoring of environmental information, health, domestic, and industrial applications. Despite of these wide usages, the main problem of this kind of topologies is the increasing security needs. This paper has been targeted to develop a novel message identity validation protocol in WSN to provide secure data identity in order to decrease some security threads. Introduced protocol also includes key distribution, node identification, sensitivity mechanisms, to strengthen the introduced method. Moreover, there is also repeated symmetrical key update mechanism without the need to synchronization. Finally, the developed protocol has also been tested in terms of various network parameters.

Last modified: 2017-06-01 08:01:43