Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
In recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of da...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2015-01-01
|
Series: | Journal of Sensors |
Online Access: | http://dx.doi.org/10.1155/2015/827546 |
id |
doaj-f89a087459ac44ae91b31f6275f42d39 |
---|---|
record_format |
Article |
spelling |
doaj-f89a087459ac44ae91b31f6275f42d392020-11-24T23:35:20ZengHindawi LimitedJournal of Sensors1687-725X1687-72682015-01-01201510.1155/2015/827546827546Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor NetworksChin-Ling Chen0Chih-Cheng Chen1De-Kui Li2Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, TaiwanDepartment of Health Policy and Management, Chung Shan Medical University, Taichung 40201, TaiwanDepartment of Information Management, Liaocheng University, Liaocheng, Shandong 252000, ChinaIn recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.http://dx.doi.org/10.1155/2015/827546 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chin-Ling Chen Chih-Cheng Chen De-Kui Li |
spellingShingle |
Chin-Ling Chen Chih-Cheng Chen De-Kui Li Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks Journal of Sensors |
author_facet |
Chin-Ling Chen Chih-Cheng Chen De-Kui Li |
author_sort |
Chin-Ling Chen |
title |
Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks |
title_short |
Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks |
title_full |
Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks |
title_fullStr |
Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks |
title_full_unstemmed |
Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks |
title_sort |
mobile device based dynamic key management protocols for wireless sensor networks |
publisher |
Hindawi Limited |
series |
Journal of Sensors |
issn |
1687-725X 1687-7268 |
publishDate |
2015-01-01 |
description |
In recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable. |
url |
http://dx.doi.org/10.1155/2015/827546 |
work_keys_str_mv |
AT chinlingchen mobiledevicebaseddynamickeymanagementprotocolsforwirelesssensornetworks AT chihchengchen mobiledevicebaseddynamickeymanagementprotocolsforwirelesssensornetworks AT dekuili mobiledevicebaseddynamickeymanagementprotocolsforwirelesssensornetworks |
_version_ |
1725526481202839552 |