Full Paper View Go Back

Key Management in Hierarchical Sensor Networks Using Improved Evolutionary Algorithm

G.R. Shahmohammadi1 , Kh.Mohammadi 2

1 Department of information Technology, University of olum Entezami, Amin, Iran.
2 Department of Computer System, University of Ashtian Islamic Azad, Ashtian, Iran .

Section:Research Paper, Product Type: Journal
Vol.4 , Issue.2 , pp.5-14, Apr-2016

Online published on Apr 27, 2016


Copyright © G.R. Shahmohammadi, Kh.Mohammadi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G.R. Shahmohammadi, Kh.Mohammadi, “Key Management in Hierarchical Sensor Networks Using Improved Evolutionary Algorithm,” International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.2, pp.5-14, 2016.

MLA Style Citation: G.R. Shahmohammadi, Kh.Mohammadi "Key Management in Hierarchical Sensor Networks Using Improved Evolutionary Algorithm." International Journal of Scientific Research in Network Security and Communication 4.2 (2016): 5-14.

APA Style Citation: G.R. Shahmohammadi, Kh.Mohammadi, (2016). Key Management in Hierarchical Sensor Networks Using Improved Evolutionary Algorithm. International Journal of Scientific Research in Network Security and Communication, 4(2), 5-14.

BibTex Style Citation:
@article{Shahmohammadi_2016,
author = {G.R. Shahmohammadi, Kh.Mohammadi},
title = {Key Management in Hierarchical Sensor Networks Using Improved Evolutionary Algorithm},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2016},
volume = {4},
Issue = {2},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {5-14},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=232},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=232
TI - Key Management in Hierarchical Sensor Networks Using Improved Evolutionary Algorithm
T2 - International Journal of Scientific Research in Network Security and Communication
AU - G.R. Shahmohammadi, Kh.Mohammadi
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 5-14
IS - 2
VL - 4
SN - 2347-2693
ER -

1942 Views    1445 Downloads    1406 Downloads
  
  

Abstract :
Secure key exchange in wireless sensor networks is a topic always considered in terms of processing power and power consumption of sensor nodes in addition to security problems. Because of limited processing and energy in these nodes, energy consumption during this exchange process is one of the most important components examined in key exchange .In this paper, a hierarchical model of key distribution management is presented in which energy consumption is reduced in nodes, leading to increased network stability and longevity of nodes. In Wireless Sensor Network security field, each pre-distribution key approach demands appropriate management on keys, which is known as key management scheme. The main focus on the issue of key management is how to generate keys and control the power (energy) of nodes as well as lower the memory consumption. The proposed method is based on evolutionary algorithms. Firefly evolutionary algorithm has been used to find the public optimal solution as soon as possible, optimally solve the potential test functions as well as solving optimization problems in case of presence of noise in data. Thus, the first objective of this thesis is optimal production of safe keys in hierarchical sensor networks using a firefly algorithm. Evaluation criteria of the proposed algorithm include power (energy) control in nodes as well as lower memory consumption .The second objective of this study is to develop an improved firefly optimization algorithm in which improved synchronization rate and algorithm performance is sought via convergence of main and control parameters. Experimental results of the proposed method on different distributions of sensor nodes, header and sink prove the superiority of proposed method in comparison to the other key management schemes.

Key-Words / Index Term :
Wireless sensor networks(WSN), Key management optimization algorithms, Evolutionary Algorithms, Firefly Algorithm

References :
[1] N. Ali, Sh. Javad, A. Fateme," Key exchange in wireless sensor networks for energy management approach", Tenth international conference Iranian security, pages 88-93, 2013.
[2] S. Lawrence, L. Qiaoliang, N. Mary and F. Bo, "Key Pre-Distribution And The Average Distance In Wireless Sensor Networks", Second International Conference On Computer And Network Technology(ICCNT), pp.212-216,China,2010.
[3] F. Etimad, V. C. Gungor, L. Nassef, N. Akkari, MG A. Maik, S. Almasri and I. F. Akyildiz. "A survey on wireless sensor networks for smart grid," Computer Communications, volume 71, pages22-33, 1november 2015.
[4] C.L. Wang, T.P. Hong, G. Hoing, W.H. Wang, "A GA- Based Key- Management Scheme in Hierarchical Wireless Sensor Networks", International Journal of Innovative Computing, Information and Control, Vol. 5, Number 12, pp. 4693-4702, December 2009.
[5] Perrig.A, Szewczyk. R, Wen.V, Culler.D, Tygar.J.D, “SPINS: Security Protocols for Sensor Networks”, int,Journal of Wireless networks, volume 8, issue 5, pages 521-534, September 2002.
[6] Chan. H, Perrig. A, “Random key predistribution schemes for sensor networks”. In: Proceedings of the 2003 IEEE symposium on security andprivacy, pages 197-213, May 2003.
[7] Du .W, Han .Y S, Chen .S, Varshney .P K, “A key management scheme for wireless sensor networks using deployment knowledge”, Int, Conference of the IEEE Computer and Communications Societies, Volume 1, pages 586-597, April 2004.
[8] Y.J. Huang, I.E. Liao and H.W. Tang, “A forward authentication key management scheme for heterogeneous wireless sensor network”, EURASIP Journal on Wireless Communications and Networking, Vol. 2011, No.6, January 2011.
[9] B. Walid, Y. Challal, A. Bouabdallah, and V.Tarokh, "A highly scalable key pre-distribution scheme for wireless sensor networks,"International Journal of Emerging Engineering Research and Technology, Volume 2, Issue 8, Pages 18-23, November 2014.
[10] A. Moshaddique, J. Liu, and K. Kwak. "Security and privacy issues in wireless sensor networks for healthcare applications." Journal of medical systems, Volume 36, Issue 1, pages 93-101, February 2012.
[11] C.-L. Wang, T.-P. Hong, G. Hoing, W.-H. Wang, "A GA- Based Key- Management Scheme in Hierarchical Wireless Sensor Networks", International Journal of Innovative Computing, Information and Control, Vol. 5, Number 12(A), pp. 4693-4702, December 2009.
[12] Lai. B, Kim. S, Verbauwhede. I, “Scalable session key construction protocol for wireless sensor networks”, In: Proceedings of the IEEE workshop on Large Scale Real Time and Embedded Systems LARTES, pages 1-6, December 2002.
[13] Chan. H, Perrig. A, “PIKE: peer intermediaries for key establishment in sensor networks”, in: Proceedings of the 24th annual joint conference of the IEEE computer and communications societies (INFOCOM’05), pages 524-535, March 2005.
[14] Nanda. S, Jagannath, and G. Panda, "A survey on nature inspired metaheuristic algorithms for partitional clustering", Swarm and Evolutionary Computation, Volume 16, pp. 1-18, June 2014.
[15] B. Kadri, D. Moussaoui, M. Feham and A. Mhammed an, “Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks”, Vol. 4, N0 6, pp. 155-161, June 2012.
[16] H. Xiaobing, M. Niedermeier & H. D. Meer, "Dynamic key management in wireless sensor networks: A survey", Journal of Network and Computer Applications, Vol.36, No.2, pp. 611-622, March 2013.
[17] M. Ito and M. Tanaka, "Localization of a Moving Sensor by Particle Filters", International Journal of Innovative Computing, Information and Control, Vol. 4, No. 1, pp. 165-173, January 2008.
[18] Ellis, R. Steven, “Entropy, large deviations, and statistical mechanics Entropy, large deviations, and statistical mechanics”, Springer Science & Business Media, ISBN: ISBN: 978-1-46-13-8532-2, 2012.
[19] David. E. Goldberg, “Genetic Algorithm in Search, Optimization and Machine Learning”, Kluwer Academic Publishers, Boston, MA, ISBN: ISBN: 0201157675, Pages 95-99, 1989.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation