Journal of Applied Information Science

1. Md. Habibur Rahman – Department Of Computer Science And Engineering, Islamic University, Kushtia, Bangladesh.

2. Md. Ibrahim Abdullah – Department Of Computer Science And Engineering, Islamic University, Kushtia, Bangladesh.

Received
26-Aug-2015
Accepted
-
Published
26-Aug-2015
Abstract
The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialize secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.
Locked
Subscribed
Open Access