Given the affectability of the potential WSN applications and in
view of asset confinements, key administration rises as a testing issue for
WSNs. One of the fundamental concerns when planning a key administration
conspire is the system adaptability. Without a doubt, the convention should
bolster countless to empower an expansive scale organization of the system.
In this paper, we propose another adaptable key administration conspire for
WSNs which gives a decent secure network scope. For this reason, we make
utilization of the unital plan hypothesis. We demonstrate that the
fundamental mapping from unitals to key pre- conveyance enables us to
accomplish high system adaptability. In any case, this credulous mapping
does not ensure a high key sharing likelihood. Along these lines, we propose
an improved unital-based key pre- conveyance conspire giving high system
versatility and great key sharing likelihood roughly bring down limited by 1
− e−1≈0.632. We lead surmised investigation and recreations and contrast
our answer with those of existing techniques for various criteria, for
example, stockpiling overhead, arrange adaptability, organize availability,
normal secure way length and system strength. Our outcomes demonstrate
that the proposed approach upgrades the system adaptability while giving
high secure network scope and general enhanced execution. Besides, for an
equivalent system estimate, our answer lessens fundamentally the capacity
overhead contrasted with those of existing arrangements.
Keywords- Wireless sensor networks (WSNs),Micro-Electro-Mechanical
1. W. Du, J. Deng, Y. Han, S. Chen, and P.Varshney, “A key management scheme for wireless sensor networks using
deployment knowledge,” in Proc. 2004 IEEE INFOCOM, pp. 586–597.
2. Castelluccia and A. Spognardi, “A robust key pre-distribution protocol for multi-phase wireless sensor networks,” inProc.
2007 IEEE Securecom, pp. 351–360.
3. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in Proc. 2003 ACM CCS, pp. 52–61.
4. Z. Yu and Y. Guan, “A robust group-based key management scheme for wireless sensor networks,” in
5. Proc. 2005 IEEE WCNC, pp. 1915–1920.
6. S. Ruj, A. Nayak, and I. Stojmenovic, “Fully secure pairwise and triple key distribution in wireless sensor networks
using combinatorial designs,” in Proc. 2011 IEEE INFOCOM, pp. 326–330.
7. S. Zhu, S. Setia, and S. Jajodia, “Leap: efficient security mechanisms for large-scale distributed sensor networks,” in Proc.
2003 ACM CCS, pp. 62–72.
8. S. A. C¸ amtepe and B. Yener, “Combinatorial design of key distribution mechanisms for wireless sensor networks,”
IEEE/ACM Trans. Netw., vol. 15, pp. 346– 358, 2007.
9. M. Rahimi, H. Shah, G.S. Sukhatme, J. Heideman, D. Estrin, Studying the feasibility of energy harvesting in mobile sensor
network, in: Proceedings of the IEEE ICRA, 2003, pp. 19–24.
10. Kansai, M.B. Srivastava, An environmental energy harvesting framework for sensor networks, in: Proceedings of the International
Symposiumon LowPower Electronics andDesign, 2003, pp. 481–486.