A Novel Approach for Secure Keying Protocol for Sensor Networks
B.Srinivas1, P.Satheesh2, G.Gowthami3

1B.Srinivas, Computer Science and Engineering, M.V.G.R. College of Engineering, Vizianagaram, India.
2P.Satheesh, Computer Science and Engineering, M.V.G.R. College of Engineering, Vizianagaram, India.
3G.Gowthami, Computer Science and Engineering, M.V.G.R. College of Engineering,Vizianagaram,India.
Manuscript received on November 01, 2012. | Revised Manuscript received on November 02, 2012. | Manuscript published on November 05, 2012. | PP: 197-200 | Volume-2 Issue-5, November 2012. | Retrieval Number: E1041102512/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A sensor network is composed of large number of sensor nodes. Each sensor needs to securely communicate with the adjacent sensors in the network. To provide security between every pair of adjacent sensor each sensor in a network needs to store ‘n -1’symmetric keys But The storage requirement of this keying protocol is very complex. In this paper, we propose a new keying protocol which reduces the number of keys to be stored in each sensor. we present a fully secure keying protocol here each sensor needs to store (n+1)/2 keys, which is less than the n-1 keys and symmetric keys are used to encrypt and decrypt the exchanged data for secure communication. At least (n-1)/2 keys are required to store in each sensor to secure an entire keying protocol. This new secure keying protocol is very secure against impersonation, eavesdropping and collision attacks.
Keywords: Keying protocol, secure communication, sensor network, symmetric keys