Reference Hub26
Lightweight Key Management for Adaptive Addressing in Next Generation Internet

Lightweight Key Management for Adaptive Addressing in Next Generation Internet

Vinod Vijaykumar Kimbahune, Arvind V. Deshpande, Parikshit Narendra Mahalle
Copyright: © 2017 |Volume: 8 |Issue: 1 |Pages: 20
ISSN: 1941-6237|EISSN: 1941-6245|EISBN13: 9781522512219|DOI: 10.4018/IJACI.2017010103
Cite Article Cite Article

MLA

Kimbahune, Vinod Vijaykumar, et al. "Lightweight Key Management for Adaptive Addressing in Next Generation Internet." IJACI vol.8, no.1 2017: pp.50-69. http://doi.org/10.4018/IJACI.2017010103

APA

Kimbahune, V. V., Deshpande, A. V., & Mahalle, P. N. (2017). Lightweight Key Management for Adaptive Addressing in Next Generation Internet. International Journal of Ambient Computing and Intelligence (IJACI), 8(1), 50-69. http://doi.org/10.4018/IJACI.2017010103

Chicago

Kimbahune, Vinod Vijaykumar, Arvind V. Deshpande, and Parikshit Narendra Mahalle. "Lightweight Key Management for Adaptive Addressing in Next Generation Internet," International Journal of Ambient Computing and Intelligence (IJACI) 8, no.1: 50-69. http://doi.org/10.4018/IJACI.2017010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The continuous evolution of Next Generation Internet (NGI) amplifies the demand for efficient and secure communication capable of responding effectively to the challenges posed by the emerging applications. For secure communication between two sensor nodes, a secret key is needed. Cryptographic key management is a challenging task in sensor networks as the hostile environment of sensor networks makes it more prone to attacks. Apart from resource constraints of the devices, unknown topology of the network, the higher risk of node capture and lack of a fixed infrastructure makes the key management more challenging in Wireless Sensor Network (WSN). Paper surveys different key Management schemes for WSN. The paper presents the efficiency versus security requirements tradeoffs in key management for WSN. Paper also proposes a novel key management protocol which provides strong resistance against replay attacks. The results obtained from the mathematical model based on conditional probability of the scheme suggest that the proposed key management in NGI is efficient and attack resistant.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.