You are on page 1of 10

Wireless Sensor Network:

Wireless Network
Composed of spatially distributed Autonomous devices
using sensor
It monitors the Physical or environmental conditions.

HetrogeneousWSN:
In Heterogeneous Network Large no. of inexpensive nodes
perform sensing, while few nodes having more energy
perform data filtering, fusion, transportation etc.
It has the prolong lifetime and provides reliability
Finding the best path among all the nodes to transfer
the data from source to sink.
Why Security for Routing?
To protect the node from the intruder.
Key Management
The intruder can trace the key at anyway while
Pre-distribution of keys, and sharing the key between
the source and sink.
Keys should be distributed or generated without the
intervention of intruders
Avoiding the Pre-distribution of keys.

Avoiding the Data Redundancy

Providing the Security to the Routing between the


nodes by Generating the key Dynamically .
lin Shen and Xianquan SHI ,A Dynamic cluster based key management in wsn, 2008
In this paper a Light weight key management approach is presented. It analyze the
Effective solution to the key management of hierarchical cluster Based key management.

Kun zhang, Cong Wang,A Secure Routing Protocol for Cluster-Based Wireless
Sensor Networks Using Group Key Management,
In this paper represent they adding a security to the routing which
consisted the sensor node with limited resources and propose the security solution
For LEACH,a protocol in which the clusters are formed dynamically and periodically.

Xiangqian Chen ,Kia Makki,and Nikki Pissinou,Sensor Network Security,2009.


In this paper they are given the overview of security issue, key management, attack
Detection and prevention, secure routing.
All nodes cant Perform complex Operations in Homogeneous
Less Lifetime
Frequently the Cluster Head need to be Changed
Not Scalable
Static Network
To provide secure routing by securely managing the
keys. The proposed system includes:
Clustering
Data Aggregation
Dynamic key Generation
Secure Routing
Phase I:
Clustering
Data Aggregation
Routing

Phase II:
Attack Generation & Analysis
Dynamic Key management
Secure Routing
Attack Generation & Analysis
K. Fokine, Key Management in Ad Hoc Networks, Master
Thesis, LiTH-ISY-EX-3322-2002, Lindkpings tekniska hgskola,

X. Cao and G. Chen, ROSS: Resource Oriented


Security Solution for Heterogeneous Clustered
Sensor Networks, Int. J. of Intelligent Control and
Systems, 12(4):317- 324, 2007.

R. Dutta and T. Dowling, Secure and Efficient Group Key Agreements


for Cluster Based Network, in Transactions on Computational Science
Iv: Special Issue on Security in Computing, Lecture Notes In Computer
Science, vol. 5430. Springer-Verlag, Berlin, Heidelberg, 87-116, 2009.

You might also like