International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 284

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10


     

Designing an Improved KISS Environment

Mohinder Singh, Harmandeep Singh


Abstract: Wireless Sensor Networks consist of a number of wireless nodes connected to each other using wireless connections. Because these nodes are wirelessly connected with each other and base stations, they are highly prone to the hacking attacks. When the WSN nodes are in working condition, they need secure cryptographic keys for secure propagation of the sensitive information. Existing cryptographic key management and distribution technique usually consume higher amount of energy and put larger computational overheads on Wireless Sensor Nodes. An effective corporate key management and distribution policy is required to maintain the security of the wireless sensor nodes without compromising battery power. None of the current commercial systems (either based on software or hardware security modules) or research proposals effectively address both challenges. This paper represents an improved key management architecture, called KISS for the WSNs, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. KISS allows only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to KISS and verify system output.


Keywords: SENSOE, NETWORK, DIRECTED DIFFUSION, BTS, KEY


Edition: Volume 3 Issue 12, December 2014


Pages: 1255 - 1257



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Mohinder Singh, Harmandeep Singh, "Designing an Improved KISS Environment", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1255-1257, URL: https://www.ijsr.net/getabstract.php?paperid=SUB14277, DOI: https://www.doi.org/10.21275/SUB14277



Downloads: 656 | Views: 2004

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 722

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 703

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 700

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 690

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top