Advertisement

Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks

  • Shantala Devi PatilEmail author
  • B. P. Vijayakumar
  • Kiran Kumari Patil
Conference paper
  • 294 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 555)

Abstract

We intend to introduce through this paper a new fractal-based cryptographic method to the world of wireless sensor networks (WSNs). Fractal cryptography is part of chaos cryptography with strong security features due to its chaotic nature and complex structure, making it more preferable than the prevailing cryptographic schemes. In this paper, a novel fractal PKC-based key management scheme for heterogeneous mobile WSNs is proposed. The scheme uses the Mandelbrot and Julia fractal sets due to their strong interconnectivity and is more efficient for resource-constrained WSNs with short key size than RSA and ECC. We compare the efficiency of the proposed scheme with the existing schemes.

Keywords

Wireless sensor networks Key management Fractal PKC 

References

  1. 1.
    Chan H., Perrig A., Song D.: Random key pre-distribution schemes for sensor networks. In: Proc. IEEE Symp. SP, pp. 197–213, (May 2003)Google Scholar
  2. 2.
    Du W., Deng J., Y. S. Han., P. K. Varshney.: A key pre-distribution scheme for sensor networks using deployment knowledge. In: IEEE Trans Dependable Secure Comput., vol. 3, no. 1, pp. 62–77, (2006)Google Scholar
  3. 3.
    N. Gura., A. Patel., A. Wander., H. Eberle., S. C. Shantz.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proc. 6th Int. Workshop Cryptograph. Hardw. Embedded Syst., pp. 119–132, (2004)Google Scholar
  4. 4.
    Chatterjee K., De., Gupta D.: An improved ID-based key management scheme in wireless sensor network. In: Proc. 3rd Int. Conf. ICSI, vol. 7332, pp. 351–359, (2012)Google Scholar
  5. 5.
    Alagheband M R., Aref M R.: Dynamic and secure key management model for hierarchical heterogeneous sensor networks. In: IET Inf. Secur., vol. 6, no. 4, pp. 271–280, (2012)Google Scholar
  6. 6.
    Chuang I H., Su W T., Wu C Y., Hsu J P., Y.-H. Kuo.: Two layered dynamic key management in mobile and long-lived cluster based wireless sensor networks. In: Proc. IEEE WCNC, pp. 4145–4150, (2007)Google Scholar
  7. 7.
    Zhang X., He J., Wei Q.: EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. In: EURASIP J. Wireless Comm. Netw. vol. 2011, pp. 1–11, (2011)Google Scholar
  8. 8.
    Szczechowiak P., Oliveira L B., Scott M., Collier M., Dahab R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Proc. 5th Eur. Conf. WSN, vol. 4913, pp. 305–320, (2008)Google Scholar
  9. 9.
    Hamed A., EL-Khamy E.: New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve Cryptography. In: 26th NATIONAL RADIO SCIENCE CONFERENCE, NRSC, pp. 1–13, (2009)Google Scholar
  10. 10.
    Srikanta Kumar Sahoo., Manmanth Narayan Sahoo.: An Elliptic Curve based Hierarchical Cluster Key Management in WSN. In: ICACNI 209Google Scholar
  11. 11.
    M Alia., A Samsudin.: New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Set. In: International Journal of Computer Science and Network Security, 7 pp. 302–307, (2007)Google Scholar
  12. 12.
    Patil S D., Vijayakumar B P.: Clustering in Mobile Wireless Sensor Networks: A Review. In: International Conference on Innovations in computing and networking, (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Shantala Devi Patil
    • 1
    Email author
  • B. P. Vijayakumar
    • 2
  • Kiran Kumari Patil
    • 3
  1. 1.Computer Science and EngineeringREVA Institute of Technology and ManagementBangaloreIndia
  2. 2.Information Science and EngineeringM S Ramaiah Institute of TechnologyBangaloreIndia
  3. 3.School of Computing and Information TechnologyREVA UniversityBangaloreIndia

Personalised recommendations