•  
  •  
 

International Journal of Smart Sensor and Adhoc Network

Abstract

WSN usually consists of a large number of resource constraint

sensor nodes that are generally deployed in unattended/hostile

environments and Existing security designs mostly provide a hop-by-hop

security paradigm. Furthermore, existing security designs are also

vulnerable to many types of Denial of Service (DoS) attacks, such as

random node capture attack, report disruption attacks and selective

forwarding attacks. We come up with a new concept that provide end-toend

security framework in which secret keys are generated and each node

stores a few keys based on Time Schema . The proposed multifunctional

key management framework assures both node-to-sink and node-to-node

authentication along the report forwarding routes.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.