Designing an Improved KISS Environment
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)Publication Date: 2014-12-05
Authors : Mohinder Singh; Harmandeep Singh;
Page : 1255-1257
Keywords : SENSOE; NETWORK; DIRECTED DIFFUSION; BTS; KEY;
Abstract
Wireless Sensor Networks consist of a number of wireless nodes connected to each other using wireless connections. Because these nodes are wirelessly connected with each other and base stations, they are highly prone to the hacking attacks. When the WSN nodes are in working condition, they need secure cryptographic keys for secure propagation of the sensitive information. Existing cryptographic key management and distribution technique usually consume higher amount of energy and put larger computational overheads on Wireless Sensor Nodes. An effective corporate key management and distribution policy is required to maintain the security of the wireless sensor nodes without compromising battery power. None of the current commercial systems (either based on software or hardware security modules) or research proposals effectively address both challenges. This paper represents an improved key management architecture, called KISS for the WSNs, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. KISS allows only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to KISS and verify system output.
Other Latest Articles
- Survey on Multi-Document Summarizer
- A Survey on Optical Character Recognition Techniques
- Dairy Production Constraints in Kericho and Bomet Counties of Kenya: Evidence from Farmers Fields
- A Study on Automation of E-Procurement System
- GIS Analysis and Spatial Modelling for Optimal Oil Pipeline Route Location: A Case Study of Proposed Isiolo Nakuru Pipeline Route
Last modified: 2021-06-30 21:15:01