Ubiquitous Communications and Network Computing. Second EAI International Conference, Bangalore, India, February 8–10, 2019, Proceedings

Research Article

Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs

Download
144 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-20615-4_14,
        author={K. Hamsha and G. Nagaraja},
        title={Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs},
        proceedings={Ubiquitous Communications and Network Computing. Second EAI International Conference, Bangalore, India, February 8--10, 2019, Proceedings},
        proceedings_a={UBICNET},
        year={2019},
        month={5},
        keywords={Light weight key management Secure hierarchical networks Threshold cryptography WSN},
        doi={10.1007/978-3-030-20615-4_14}
    }
    
  • K. Hamsha
    G. Nagaraja
    Year: 2019
    Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs
    UBICNET
    Springer
    DOI: 10.1007/978-3-030-20615-4_14
K. Hamsha1,*, G. Nagaraja1,*
  • 1: R V College of Engineering
*Contact email: hamshak@gmail.com, nagarajags@rvce.edu.in

Abstract

Secure communication among sensors is strongly needed to avoid malicious activity. Security is a major issue in self-organized, infrastructure less networks with limited resources such as energy, transmission range, and processing. The amount of network overhead needs to be reduced to improve the network performance. The size of the secret key to be communicated among the sensor nodes is also contributing in network performance. The Proposed Light Weight Threshold Key Management Scheme (LWKMS), reduces the size of the secret key to be communicated. It reduces the network resource utilization, in sharing the secret among the sensor nodes in the network and provides efficient security even when the keys are compromised by an attacker node. Simulation results shows that the proposed light weight scheme provides less overhead along with less energy consumption as compared to existing method namely Group Key Management Scheme (GKMS).