Ubiquitous computing environments find their practical implementations through wireless sensor networks, which sense a relationship among themselves and the environment. Presently devised key management schemes are classified namely for homogeneous environments, or heterogeneous environments. In this paper, we propose a deployment conscious security framework supporting, a shift of complex operations to more capable nodes of heterogeneous environment and relieving resource constrained generic sensor nodes of major activities. We introduced a concept of deployment knowledge independent group key generation using a special kind of heterogeneity-multilevel transmission. Performance of proposed key management schemes is evaluated across relevant matrices and concluded to be satisfactory. Findings show that asymmetric key cryptography is comparatively more demanding in resources than symmetric version but ensures maximum security. Through our work we able to conclude that a hybrid of asymmetric and symmetric key cryptography best suits heterogeneous environments.
Content
Author and article information
Contributors
Kamal Kumar
A.K. Verma
R.B. Patel
Conference
Publication date:
September
2010
Publication date
(Print):
September
2010
Pages: 1-11
Affiliations
[0001]M.M. Engineering College,
Mullana, Ambala, Haryana, India.
+91-9416985852
[0002]Thapar University,
Patiala, Punjab, India.
+91-9888601667
[0003]M.M. Engineering College,
Mullana, Ambala, Haryana, India.
+91-9416932840