首页    期刊浏览 2024年11月08日 星期五
登录注册

文章基本信息

  • 标题:A PATTERN BASED KEY GENERATION TO AUTHENTICATION FOR MULTIHOP ROUTING IN WMSN
  • 本地全文:下载
  • 作者:P. Kalyani ; Dr.C.Chellappan
  • 期刊名称:International Journal on Computer Science and Engineering
  • 印刷版ISSN:2229-5631
  • 电子版ISSN:0975-3397
  • 出版年度:2011
  • 卷号:3
  • 期号:1
  • 页码:299-306
  • 出版社:Engg Journals Publications
  • 摘要:Recent research work in the Wireless Sensor Networks involves the homogeneous networks in which the sensor nodes in the specific cluster can get the key value from any other cluster. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead . The security implementation analysis is separated into two levels, 1. Encryption and Authentication from Sensor modes to Cluster Head. 2. Encryption and Authentication from Cluster Heads to Base Station. This Dual level Encryption standards not only blocks the malicious data from overspreading the network traffic all along the network path but also efficiently shares the dynamic keys. In this research the second level of security has considered and the dynamic keys are generated based on pass pattern or graphical picture. Here dynamic means both 1). The display and selection of characters from a 7x7 matrix called pattern square changes in every session and 2). The strength and degree of security changes dynamically. This pattern consists of a set of symbols such as special characters, alphabets, numbers, etc. by default. The character entered by the user is subjected to the first level of encryption. The encrypted string is placed in 5x5 matrix called magic square. The second level of encryption applied to the pattern value and finally stored in the database in row major. The pass pattern is selected from the pattern square characters which are randomly displayed for each session. This random change in display of characters leads to higher level of security. Also the user is allowed to select their pattern in reverse order which ensures more degree of security against the attack by crackers. This method is strong and robust against all possible attacks and works in the existing infrastructure without compromising the user�s comfort.
  • 关键词:Pass Pattern; magic square; PPS; Pattern square; matrix encryption.
国家哲学社会科学文献中心版权所有