Disjoint Key Establishment Protocol for Wireless Sensor and Actor NetworksReport as inadecuate

Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks - Download this document for free, or read online. Document in PDF available to download.

Journal of Sensors - Volume 2016 2016, Article ID 5071617, 15 pages -

Research Article

Department of Computer Science, National University of Modern Languages, Islamabad 44000, Pakistan

Department of Computer Science and Software Engineering, International Islamic University, Islamabad 44000, Pakistan

College of Computer and Information Sciences, King Saud University, Riyadh 12372, Saudi Arabia

Department of Electrical and Computer Engineering, College of Engineering, Dhofar University, 211 Salalah, Oman

Received 25 March 2016; Accepted 5 May 2016

Academic Editor: Fanli Meng

Copyright © 2016 AtaUllah Ghafoor et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Key distribution is essential for providing secure communication between commercial and sensitive applications of wireless sensor and actor networks WSANs. It becomes more challenging when any of the intermediate sensor nodes is compromised by the adversaries as the messages carrying secure keys will be exposed and links will be unreliable. This paper presents a Disjoint Key Establishment Protocol DKEP that does not require transmitting keys across the nodes. In DKEP, each node is preloaded with one row and one column from a matrix. After the deployment, indices for row and column are exchanged between the two nodes and values at intersection of row and column index will be used to calculate the key on each node. DKEP is verified by performing formal analysis using Rubin Logic and validated using simulations in NS-2. Simulation results demonstrate the effectiveness and efficiency of DKEP compared to contemporary schemes in terms of reducing storage and communication cost and improving resilience against node compromise attacks. Moreover, the proposed scheme is implemented in a group-based mobile application scenario for secure message exchange.

Author: AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran, and Imran Baig

Source: https://www.hindawi.com/


Related documents