Effective Key Distribution Scheme using Paillier Cryptosystem in Wireless Sensor Networks
Paresh R. Jadhav1, Shubhangi D. Sapkal2
1Paresh Rajendra Jadhav, Department of Computer Science and Engineering, Government College of Engineering, Aurangabad 431005, India.
2Dr. Shubhangi Deorao Sapkal, Department of Computer Science and Engineering, Government College of Engineering, Aurangabad 431005, India.
Manuscript received on 30 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 1531-1535 | Volume-8 Issue-9, July 2019 | Retrieval Number: I8164078919/19©BEIESP | DOI: 10.35940/ijitee.I8164.078919
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Main problem is when setting up Wireless(W)-Sensor(S)-Network(N) intended for node communication arises for security. Discussed here is a three-tier architecture with two polynomial pools containing wireless routers, key generation center and few access points which are also sensor nodes that can be mobile devices that intend to get better security. The crucial feature of three tier architecture authentication, where communication between WN to access(A) point(P) is established from AP to the sensor node, resulted by pair(P)wise(W) key(K) pre-distribution (PD) methodology and the nodes are authenticated utilizing polynomial keys and Paillier cryptosystem algorithm. Presently, the WN attacks the duplication, such as seeing the nodes in the network. In the event that a nasty node is found and if you want to send packets within the network, you need to store many of keys from both pools for validation. But because there are no sufficient keys available and therefore can’t communicate with other nodes in the network. This paper describes an effective contrivance for accomplishing security between node communications by formulating three-level security architecture.
Keywords: Wireless (W)Sensor(S) network(N), Paillier Cryptosystem Algorithm, Pairwise Pre-distribution Key Scheme, Cuckoo Filter, Bloom Filter
Scope of the Article: Predictive Analysis