17
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Improved Key Predistribution Scheme in Wireless Sensor Networks using Cell Splitting in Hexagonal Grid based Deployment Model

, &
Pages 850-866 | Published online: 13 Nov 2009
 

Abstract

Security in wireless sensor networks is an upcoming field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a wireless sensor network, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in wireless sensor networks. To achieve security, various key predistribution schemes have been proposed without deployment knowledge. Deployment knowledge can benefit the key predistribution scheme, as the nodes that are likely to be neighbors of each sensor node are assumed, and hence each node does not need to waste its memory to store unnecessary secret information. However, the existing key predistribution schemes require more memory and larger transmission range to achieve the desired connectivity. In order to enhance secure communication among sensor nodes, grid and hexagon deployment models are used. In both the deployment models, the sensor field is divided into equal grids. The keys are distributed from a large key pool randomly and pairwise keys are generated for each pair of sensor nodes. Once the pairwise keys are generated among neighboring nodes, they establish a secure connection and transmit data. We propose a new scheme based on cell splitting concept to improve the security level, in which a hexagon is subdivided in to smaller groups. The performance is evaluated in terms of connectivity and resilience against node capture. The analysis show that the performance is better using cell splitting concept compared to normal hexagon based scheme.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.