دانلود رایگان مقاله انگلیسی + خرید ترجمه فارسی | |
عنوان فارسی مقاله: | شبکه حسگر بی سیم و بررسی کلید از پیش اشتراک گذاشته شده |
عنوان انگلیسی مقاله: | SURVEY ON PRE-SHARED KEY IN WIRELESS SENSOR NETWORK |
دانلود مقاله انگلیسی: | برای دانلود رایگان مقاله انگلیسی با فرمت pdf اینجا کلیک نمائید |
مشخصات مقاله انگلیسی (PDF) و ترجمه مقاله (Word) | |
سال انتشار مقاله | 2012 |
تعداد صفحات مقاله انگلیسی | 7 صفحه با فرمت pdf |
تعداد صفحات ترجمه مقاله | 11 صفحه با فرمت ورد |
رشته های مرتبط | فناوری اطلاعات |
مجله مربوطه | مجله بین المللی علوم و فن آوری های در حال ظهور با آخرین روند (International Journal for Science and Emerging Technologies with Latest Trends) |
دانشگاه تهیه کننده | گروه مهندسی علوم کامپیوتر، جالاندر، هند (Department of Computer Science Engineering, Jalandhar, India) |
کلمات کلیدی این مقاله | SWN، کلید اشتراک گذاشته شده از قبل، بهره وری انرژی در WSN، قابلیت اتصال WSN |
نشریه | ijsett |
بخشی از ترجمه:
در این مقاله، سعی شده است تا به ارائه ی رویکردی مرتبط با مدیریت کلید، و شِمای کلید اشتراک گذاشته شده از قبل در WSN پرداخته شود. در ادامه قصد داریم یک پیاده سازی از پروتکل کلید پیش مشترک و با استفاده از پارامترهای متفاوتی ارائه دهیم و محاورات گره ها را بر مبنای نتایج این پیاده سازی نشان دهیم. همچنین سعی خواهید داد تا محدودیت های مرتبط با PSK نیز تشریح شود.
١.مقدمه
یک شبکه ی سنسوری بی سیم، شبکه ای است که شامل تعدادی گره ی سنسوری بوده که به صورت بی سیم بهم متصل می باشند. این گره های سنسوری کم هزینه و با مصرف انرژی کم، میتوانند در مسافت های کوتاه با هم به محاوره بپردازند. هر گره ی سنسوری، شامل مؤلفه های حسی، پردازش داده ها و محاوره ای میباشد.تعداد زیادی از این گره های سنسوری که با هم همکاری دارند، شبکه های سنسوری بی سیم را تشکیل میدهند[١]. یک WSN معمولاٌ شامل ده ها یا صد ها نمونه از این گره ها بوده که به وسیله ی کانال های بی سیمی برای اشتراک گذاری اطلاعات و پردازش مشارکتی با هم همکاری دارند. به منظور اطمینان از مقیاس پذیری و افزایش بهره وری عملیات شبکه، گره های سنسوری معمولاٌ در داخل کلاسترهایی گروه بندی می شوند[٢,٣].
شبکه های بی سیم، شبکه هایی هستند که برای کاربران، اتصالاتی را علیرقم موقعیت فیزیکی خود فراهم می-سازند. شبکه های بی سیم، شبکه هایی بوده که با هیچ کابل ارتباطی سروکار ندارند. این تکنیکی است که باعث کاهش هزینه های کابل برا شبکه بندی و همچنین شبکه های ارتباطی راه دور می شود.معمولاٌ سیستم انتقال پیاده سازی شده و با استفاده از امواج رادیویی، در جایی که پیاده سازی در سطح فیزیکی صورت گرفته است، مدیریت می شود.
بخشی از مقاله انگلیسی:
Abstract- This paper presents the overview of key management ,and Pre-shared key scheme in WSN,then this paper presents implementation of Pre-shared key Protocol using different parameters and shows communication of nodes Based on the results of its implementation, some limitations of PSK are explained. Keywords –WSN,Pre-shared key scheme in WSN,Enegy efficiency of WSN,Connectivity of WSN. 1.Introduction A wireless sensor network is a network which consists of a number of sensor nodes that are wirelessly connected to each other. These small, low-cost, low-power, multifunctional sensor nodes can communicate in short distances. Each sensor node consists of sensing, data processing, and communication components. A large number of these sensor nodes collaborate form wireless sensor networks.[1] A WSN usually consists of tens to thousands of such nodes that communicate through wireless channels for information sharing and cooperative processing. To ensure scalability and to increase the efficiency of the network operation, sensor nodes are often grouped into clusters [2 ,3] Wireless networks are networks which provide users with connectivity regardless of their actual physical location. Wireless networks are networks that do not involve cables. It is a technique that saves the cost of cables for networking and helps entrepreneurs and telecommunication networks in specific premises in their installations. The transmission system is usually implemented and administrated via radio waves where the implementation takes place at physical level. 2.Key management in wsn In this paper, we present wireless sensor network key management survey for PSK/ Preloaded scheme and related topics on key management and further we improve its limitations through our proposed scheme. Key management is an important issue in the security of WSN. It actually helps in maintaining the confidentiality of secret information from unauthorized access. Furthermore, it is used for verifying the integrity of exchanged messages and authenticity of the sender. 2.1 Typical Key Management Goals: The protocol must establish a key between all sensor nodes that must exchange data securely Node addition / deletion should be supported It should work in undefined deployment environment Unauthorized nodes should not be allowed to establish communication with network nodes [7]. 2.2 Main features of Key Management in Wireless Sensor Networks • Confidentiality- Nodes must not reveal data to any unauthorized access. • Integrity- The data must not be changed between transmission due to environmental activity. • Data Freshness – The old data should not be behaved as a new one. • Authentication- The data which is used in decision making process must originate from correct source. • Robustness – When some nodes in the network of WSN are compromised then the entire network should not be compromised. • Self – Organization- It mainly considers with flexibility of nodes to be self organizing (autonomous) and self – healing (failure tolerant). • Availability- The network should be for appropriate interval of time. • Scalability. [8] 2.3 Limitations of Various Key Management Scheme in Wireless Sensor Networks • Network Keying: Lacks of Robustness. • Pair-wise Keying: a) Non –scalable. b) Unable to self organize. c) Not flexible. • Group Keying: a)Lacksof efficient storage for group keying in IEEE 802.15.4. b) Difficult to secure set up. c) Clusterinformation is application dependent.[7,8] 2.4 Key Management Process Key is the most important component for most of the Cryptographic algorithms. Keys are generally numbers randomly selected from a large set of numbers. Management of these keys are very important in cryptography. Management of keys include the following: (i)Key Generation: It is the process in which a pool of key are generated. It is done in offline mode by a trusted authority. (ii)Key Establishment: It is the most important phase of key management process. Key establishment is the process by which right keys for right users can be determined and key rings for each user are sent to them accordingly. Key establishment can be done in many ways. Trusted Authority can help in sending the keys to each user through a secure channel. But this mechanism is a costly one and does not suit for sensor networks. So, in sensor networks Key Pre-distribution is used in which key rings are installed in the nodes before deployment of network in offline mode.[19] Key establishment process in Wireless sensor networks mainly consists of three phases. (i)Key pre-distribution : Pre-loading keys in sensor nodes prior to deployment. The keys present in a sensor node constitute the key ring of the sensor. (ii)Shared key discovery : To find a common shared key between two communicating nodes. (iii)Path key establishment : If a common key does not exists, then a path has to be found between the communicating nodes. A path key is then established between the communicating nodes. In Key Pre-Distribution scheme, secret keys are placed in sensor nodes before deployment. When the nodes are deployed over the target area, the secret keys are used to create the network. 2.5 Implementation of Pre-shared key Protocol Step1:Key setup phase:- a)Generate key pool and corresponding key identifiers b) Randomly select keys from key pool. c) Load key into nodes memory d) Save key identifiers of a keys and associated node identifier on controller Step2:Shared-key discovery:- a )Deployement of wireless sensor network b) After deployment of WSN each node discovers its neighbor in communication range with which it shares key. c) Nodes exchanges ids of key they possess and in this way they discover common key. Step3:Path establishment:- a) During the path key establishment phase path keys are assigned to selected pairs of sensors that are within communication range but do not share key b) Node may broadcast the message with its key id, id of intended node and some key 43 Prashar and Vashisht that it posses but not currently uses ,to all nodes with which it currently has established link. Those nodes rebroadcast the message to their neighbours C) Once this message reaches the intended node, this node contacts the initiator of path key establishment.
دانلود رایگان مقاله انگلیسی + خرید ترجمه فارسی | |
عنوان فارسی مقاله: | شبکه حسگر بی سیم و بررسی کلید از پیش اشتراک گذاشته شده |
عنوان انگلیسی مقاله: | SURVEY ON PRE-SHARED KEY IN WIRELESS SENSOR NETWORK |