Protocol Design for Secure Communication in WSN
Journal: TEM JOURNAL - Technology, Education, Management, Informatics (Vol.6, No. 2)Publication Date: 2017-05-31
Authors : Oguz Ata; Hasan H. Balik; Erdem Ucar;
Page : 192-204
Keywords : User authentication; cryptanalysis; Protocol design; message authentication; security; wireless sensor networks.;
Abstract
Wireless sensor networks are widely used in military applications, monitoring of environmental information, health, domestic, and industrial applications. Despite of these wide usages, the main problem of this kind of topologies is the increasing security needs. This paper has been targeted to develop a novel message identity validation protocol in WSN to provide secure data identity in order to decrease some security threads. Introduced protocol also includes key distribution, node identification, sensitivity mechanisms, to strengthen the introduced method. Moreover, there is also repeated symmetrical key update mechanism without the need to synchronization. Finally, the developed protocol has also been tested in terms of various network parameters.
Other Latest Articles
- Assessment of the Results from Conducted Experimental Training in Computer Networks and Communications in the Laboratory Exercises
- A JOURNEY TO THE QUALITATIVE WONDERLAND: LESSONS LEARNED FOR NOVICE RESEARCHERS
- SOCIAL CAPITAL AND POLITENESS STRATEGIES IN FOSTERING ETHNIC RELATIONS IN MALAYSIA AND PHILIPPINES
- Disrupt, Deny, Dismantle: A Special Operations Forces (SOF) Model for Combatting New Terrorism
- ETHNIC POWER SHARING: THREE BIG PROBLEMS
Last modified: 2017-06-01 08:01:43