About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Machine Learning and Intelligent Communications. Second International Conference, MLICOM 2017, Weihai, China, August 5-6, 2017, Proceedings, Part I

Research Article

Secure Communication Mechanism Based on Key Management and Suspect Node Detection in Wireless Sensor Networks

Download(Requires a free EAI acccount)
256 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-73564-1_71,
        author={Danyang Qin and Songxiang Yang and Ping Ji and Qun Ding},
        title={Secure Communication Mechanism Based on Key Management and Suspect Node Detection in Wireless Sensor Networks},
        proceedings={Machine Learning and Intelligent Communications. Second International Conference, MLICOM 2017, Weihai, China, August 5-6, 2017, Proceedings, Part I},
        proceedings_a={MLICOM},
        year={2018},
        month={2},
        keywords={WSN Security Routing protocol Key management},
        doi={10.1007/978-3-319-73564-1_71}
    }
    
  • Danyang Qin
    Songxiang Yang
    Ping Ji
    Qun Ding
    Year: 2018
    Secure Communication Mechanism Based on Key Management and Suspect Node Detection in Wireless Sensor Networks
    MLICOM
    Springer
    DOI: 10.1007/978-3-319-73564-1_71
Danyang Qin1,*, Songxiang Yang1, Ping Ji1, Qun Ding1
  • 1: Heilongjiang University
*Contact email: qindanyang@hlju.edu.cn

Abstract

The limitation of bandwidth, environment and multipath fading in wireless sensor network (WSN) cannot satisfy the need of users. Cooperative multiple-input-multiple-output (C-MIMO) technology is introduced to improve the communication performance, which brings in security problem as the same time. The key management technology may ensure the confidentiality with fewer keys but is unable to resist the compromised node attack. A new detection algorithm is proposed to sign the compromised node and recover the information during the transmission. Combining the key management and compromised node detection, a secure communication mechanism for WSN is proposed to resist the external and internal attack. Simulation results verify the advantages of security and performance by the proposed communication mechanism.

Keywords
WSN Security Routing protocol Key management
Published
2018-02-09
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-73564-1_71
Copyright © 2017–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL