Key Establishment in WSN in today’s world has become more important due to advancement and need of better communication system. Due to this reason it has become important to find a means by which the communication is faster, more accurate and more secure.RSA encryption and decryption method and HLA authenticator can be used with key establishment to enhance communication system.
In this proposed thesis work we have created a network system of 100x100 area which contains approx 100 nodes. Data is transferred from source to destination using key establishment, bit map, RSA and HLA Technique at the decryption side reverse process is applied to retrieve the transmitted data. If there is any fault in node or in link of nodes or any type of failure in network system it can be easily traced and corrected. Keys are established in such a way that it prevent the network system from attacks. For this type of key establishment cluster key establishment technique has been used. The previous work is compared on the basis of various parameters like Average localization error, root mean square error and energy efficiency or accuracy. For proposed work MATLAB software has been used.
Hemanta Kumar Kalita and Avijit Kar, “Wireless Sensor Network Security Analysis”, International Journal of Next-Generation Networks (IJNGN), Vol.1, No.1, December 2009.
Yun Li, Nan Yu, Weiyi Zhang, Weiliang Zhao, Xiaohu You, Mahmoud Daneshmand, “Enhancing the performance of LEACH protocol in wireless sensor networks”, Lab. of Wireless Networks, Chongqing Univ. of Posts & Telecommun., Chongqing, China, Conference: Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference on Source: IEEE Xplore, Page no. 223 – 228, 2011.
Krzysztof Daniluka and Ewa Niewiadomska-Szynkiewicz, “A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks”, Journal of Telecommunications and Information Technology, March 2012.
M. Golsorkhtabar, F. K. Nia, M. Hosseinzadeh, Y. Vejdanparast, “The Novel Energy Adaptive Protocol for heterogeneous wireless sensor networks”, Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Volume: 2), Page no. 178 – 182, July 2010.
Vikash Kumar, Anshu Jai and P N Barwal, “Wireless Sensor Networks: Security Issues, Challenges and Solutions”, International Journal of Information & Computation Technology, ISSN 0974-2239 Volume 4, Number 8, pp. 859-868, International Research Publications House, 2014.
Baojiang Cui, ZiyueWang, Bing Zhao, Xiaobing Liang, and Yuemin Ding, “Enhanced Key Management Protocols for Wireless Sensor Networks”, Hindawi Publishing Corporation Mobile Information Systems Volume, Doi: 10.1155/2015/627548, 2015.
X. He, M. Niedermeier, and H. de Meer, “Dynamic key management in wireless sensor networks: a survey,” Journal of Network and Computer Applications, vol. 36, no. 2, pp. 611–622, 2013.
Krzysztof Daniluka and Ewa Niewiadomska-Szynkiewicz, “A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks”, Journal of Telecommunications and Information Technology, March 2012.
Z. Ming, W. Suo-ping, and X. He, “Dynamic key management scheme for wireless sensor networks based on cluster,” Journal of Nanjing University of Posts and Telecommunications (Natural Science), vol. 32, no. 1, 2012.
Deepika Gogia, Dr. Kamal Sharma, Deepak Kumar, “Zonal circular LEACH Protocol (ZCLP) for Homogeneous WSN”, International Journal of Recent Research Aspects ISSN: 2349-7688, Vol. 1, Issue 1, June 2014, pp. 65-69.
A. Savvides, C-C Han, aind M. Srivastava, ”Dynamic localization in Ad-Hoc networks of sensors,\" Proceedings of the Seventh ACM Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 166-179, July 2001.
WSN, Key Management, HLA, RSA, Cluster Key Management.