期刊名称:International Journal on Computer Science and Engineering
印刷版ISSN:2229-5631
电子版ISSN:0975-3397
出版年度:2011
卷号:3
期号:01
页码:299-306
出版社:Engg Journals Publications
摘要:Recent research work in the Wireless Sensor Networks involves the homogeneous networks in which the sensor nodes in the specific cluster can get the key value from any other cluster. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead . The security implementation analysis is separated into two levels, 1. Encryption and Authentication from Sensor modes to Cluster Head. 2. Encryption and Authentication from Cluster Heads to Base Station. This Dual level Encryption standards not only blocks the malicious data from overspreading the network traffic all along the network path but also efficiently shares the dynamic keys. In this research the second level of security has considered and the dynamic keys are generated based on pass pattern or graphical picture. Here dynamic means both 1). The display and selection of characters from a 7x7 matrix called pattern square changes in every session and 2). The strength and degree of security changes dynamically. This pattern consists of a set of symbols such as special characters, alphabets, numbers, etc. by default. The character entered by the user is subjected to the first level of encryption. The encrypted string is placed in 5x5 matrix called magic square. The second level of encryption applied to the pattern value and finally stored in the database in row major. The pass pattern is selected from the pattern square characters which are randomly displayed for each session. This random change in display of characters leads to higher level of security. Also the user is allowed to select their pattern in reverse order which ensures more degree of security against the attack by crackers. This method is strong and robust against all possible attacks and works in the existing infrastructure without compromising the user�s comfort.