WSN usually consists of a large number of resource constraint
sensor nodes that are generally deployed in unattended/hostile
environments and Existing security designs mostly provide a hop-by-hop
security paradigm. Furthermore, existing security designs are also
vulnerable to many types of Denial of Service (DoS) attacks, such as
random node capture attack, report disruption attacks and selective
forwarding attacks. We come up with a new concept that provide end-toend
security framework in which secret keys are generated and each node
stores a few keys based on Time Schema . The proposed multifunctional
key management framework assures both node-to-sink and node-to-node
authentication along the report forwarding routes.
Prasad, Mulukalla and Sandeep, CH.
"An Effective Time Management Schema in WSNs,"
International Journal of Smart Sensor and Adhoc Network: Vol. 1
, Article 2.
Available at: https://www.interscience.in/ijssan/vol1/iss1/2