Secure Self Organization of Wireless Sensor Network: A Need Based Approach Using Certificate Less Public Key Infrastructure

  • Hemanta Kumar Kalita
  • Avijit Kar
Part of the Communications in Computer and Information Science book series (CCIS, volume 142)


Wireless Sensor Network (WSN) is envisioned as a static ad hoc network. Sensor Nodes in this type of network needs to self organize themselves. During self organization sensor nodes initially discovers themselves and then joins the network. Security plays an important role when a new node joins the WSN. Only the authorized nodes should be allowed to join. However, security comes with a cost and same level of security may not be required always. Hence authors propose an approach to secure self-organization of WSN with need based security in this paper.


WSN PKI Self Organization Ad hoc Network SNEP MAC ECC SSL IP RSA ZigBee WMN 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Networks Mobile Computing and Networking (2001)Google Scholar
  2. 2.
    Stein, D.J., Esq: Wireless Sensor Network Simulator v1.1 (2005)Google Scholar
  3. 3.
    Weimin, L., Zongkai, Y., Wenqing, C., Yunmeng, T.: Research on the Security in Wireless Sensor Network. Asian Journal of Information Technology 5(3), 339–345 (2006)Google Scholar
  4. 4.
    Westoff, D., Girao, J., Sarma, J.: Security Solutions for Wireless Sensor Networks Special Issue: Dependable IT and Network Technology (2006)Google Scholar
  5. 5.
    Saxena, M.: Security in Wireless Sensor Networks- A Layer based Classification Purdue University, West Lafayette, IN 47907-2086 (2007)Google Scholar
  6. 6.
    Jung, W., Hong, S., Ha, M., Kim, Y.-J., Kim, D.: SSL-based Lightweight Security of IP-based Wireless Sensor Networks (2007)Google Scholar
  7. 7.
    Amin, F., Jahangir, A.H., Rasifard, H.: Analysis of Public-Key Cryptography for Wireless Sensor Networks Security World Academy of Science. Engineering and Technology 41 (2008)Google Scholar
  8. 8.
    Haque, M.M., Pathan, A.-S.K., Hong, C.S., Huh, E.-N.: An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks (2008)Google Scholar
  9. 9.
    Soderman, P.: An Analysis of WSN Security Managemant School of Computer Science and Engineering. Royal Institute of Technology (2008)Google Scholar
  10. 10.
    Hu, W., Corke, P., Shih, W.C., Overs, L.: secFleck: A Public Key Technology Platform for Wireless Sensor Networks (2009)Google Scholar
  11. 11.
    Lukas, G., Fackroth, C.: WMNSec Security for Wireless Mesh Networks. In: IWCMC 2009, Leipzig, Germany (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Hemanta Kumar Kalita
    • 1
  • Avijit Kar
    • 2
  1. 1.TCS Innovation Lab Performance EngineeringTATA Consultancy ServicesMumbaiIndia
  2. 2.Dept. of Computer Science & Engg.Jadavpur UniversityKolkataIndia

Personalised recommendations