Vastly Efficient Key Pre Distribution and Authentication scheme for Wireless Sensor Networks

International Journal of Computer Science and Engineering
© 2014 by SSRG - IJCSE Journal
Volume 1 Issue 7
Year of Publication : 2014
Authors : Eduru Hariprasad, J.S.V.R.S.Sastry, N. Subhash Chandra

How to Cite?

Eduru Hariprasad, J.S.V.R.S.Sastry, N. Subhash Chandra, "Vastly Efficient Key Pre Distribution and Authentication scheme for Wireless Sensor Networks," SSRG International Journal of Computer Science and Engineering , vol. 1,  no. 7, pp. 23-26, 2014. Crossref,


The sensitivity of the potential applications of wireless sensor networks, security providing as a challenging issue in these networks. Due to the resource boundaries, symmetric key establishment is one favorite paradigm for securing WSN. One of the main concerns when designing a key authentication scheme for WSN is the network scalability. Indeed, the protocol should support a large number of nodes to enable a large scale deployment of the network. . Due to resource constraints, achieving such key agreement in wireless sensor networks is nontrivial. Many key authentication schemes used in general networks and public-key based schemes, are not suitable for wireless sensor networks. Pre-distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the network size is large. Recently, a random key predistribution scheme is proposed in that no deployment knowledge is available. We propose a novel random key predistribution scheme that exploits deployment knowledge and avoids unnecessary key assignments. So that the performance of sensor networks can be substantially improved with the use of our proposed scheme.


Wireless sensor networks, Key Authentication,Network Scalability, Resource Optimization...


[1] Yun Zhou, Yuguang Fang, and Yanchao Zhang. Securing wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 10(1-4):6–28, 2008. 
[2] Wireless Integrated Network Sensors, University of California. 
[3] Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz. Comparing elliptic curve cryptography and rsa on 8-bit cpus. In CHES, pages 119–132, 2004. 
[4] J. Zhang and V. Varadharajan. Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33(2):63 – 75, 2010. 
[5] K. Kifayat, M. Merabti, Q. Shi, and D. Llewellyn-Jones. Security in wireless sensor networks. In Handbook of Information and Communication Security, pages 513–552. 2010.