Professional Documents
Culture Documents
Wireless Network
Composed of spatially distributed Autonomous devices
using sensor
It monitors the Physical or environmental conditions.
HetrogeneousWSN:
In Heterogeneous Network Large no. of inexpensive nodes
perform sensing, while few nodes having more energy
perform data filtering, fusion, transportation etc.
It has the prolong lifetime and provides reliability
Finding the best path among all the nodes to transfer
the data from source to sink.
Why Security for Routing?
To protect the node from the intruder.
Key Management
The intruder can trace the key at anyway while
Pre-distribution of keys, and sharing the key between
the source and sink.
Keys should be distributed or generated without the
intervention of intruders
Avoiding the Pre-distribution of keys.
Kun zhang, Cong Wang,A Secure Routing Protocol for Cluster-Based Wireless
Sensor Networks Using Group Key Management,
In this paper represent they adding a security to the routing which
consisted the sensor node with limited resources and propose the security solution
For LEACH,a protocol in which the clusters are formed dynamically and periodically.
Phase II:
Attack Generation & Analysis
Dynamic Key management
Secure Routing
Attack Generation & Analysis
K. Fokine, Key Management in Ad Hoc Networks, Master
Thesis, LiTH-ISY-EX-3322-2002, Lindkpings tekniska hgskola,