Main Reference PaperNew Framework for Enhanced Secure Key Management in Hierarchical Wireless Sensor Network, International Journal of Computer Applications, July 2013.
  • Proposed framework is the base station computes all the keys required for both inter and intra cluster communications. Cluster is further isolated into small geographical areas on the basis of hop count from the cluster head. The sensor nodes in the network join the cluster on the basis of the distance (hop counts) from the cluster head which localizes the path key things and reduces the overhead. The proposed framework is divided into four stages pre key distribution, pair wise key establishment, computing the path key and re keying all the keys.

+ Description
  • Proposed framework is the base station computes all the keys required for both inter and intra cluster communications. Cluster is further isolated into small geographical areas on the basis of hop count from the cluster head. The sensor nodes in the network join the cluster on the basis of the distance (hop counts) from the cluster head which localizes the path key things and reduces the overhead. The proposed framework is divided into four stages pre key distribution, pair wise key establishment, computing the path key and re keying all the keys.

  • To provide the security for both inter and intra cluster communication

  • To enhance the security of the network

  • It also provides the robust mechanism for continuous authentication of nodes in the network.

+ Aim & Objectives
  • To provide the security for both inter and intra cluster communication

  • To enhance the security of the network

  • It also provides the robust mechanism for continuous authentication of nodes in the network.

  • The trust value based system is contributed to the existing secure key management. Initially, the trust value of all node is maintained as high value. If the misbehaving node is detected its trust value can be reduced. This will preserve the authentication.

+ Contribution
  • The trust value based system is contributed to the existing secure key management. Initially, the trust value of all node is maintained as high value. If the misbehaving node is detected its trust value can be reduced. This will preserve the authentication.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.