Secure Deployment with Optimal Connectivity in Wireless Sensor Networks

Secure Deployment with Optimal Connectivity in Wireless Sensor Networks

Anju Sangwan, Rishipal Singh
Copyright: © 2016 |Volume: 7 |Issue: 2 |Pages: 21
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781466689916|DOI: 10.4018/IJMCMC.2016040101
Cite Article Cite Article

MLA

Sangwan, Anju, and Rishipal Singh. "Secure Deployment with Optimal Connectivity in Wireless Sensor Networks." IJMCMC vol.7, no.2 2016: pp.1-21. http://doi.org/10.4018/IJMCMC.2016040101

APA

Sangwan, A. & Singh, R. (2016). Secure Deployment with Optimal Connectivity in Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 7(2), 1-21. http://doi.org/10.4018/IJMCMC.2016040101

Chicago

Sangwan, Anju, and Rishipal Singh. "Secure Deployment with Optimal Connectivity in Wireless Sensor Networks," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 7, no.2: 1-21. http://doi.org/10.4018/IJMCMC.2016040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the hostile areas, deployment of the sensor nodes in wireless sensor networks is one of the basic issue to be addressed. The node deployment method has great impact on the performance metrics like connectivity, security and resilience. In this paper, a technique based on strong keying mechanism is proposed which will enhance the security of a non-homogeneous network using the random deployment of the nodes. For this, the q-composite key pre-distribution technique is presented with new flavor that will enhance the network size as well as the security level in comparison to the existing techniques. The technique ensures the k-connectivity among the nodes with a redundant method to provide backup for failed nodes. In the simulation section, the performance of the proposed scheme is evaluated using NS-2 based upon the real model MICAz. A discussion based on various obtained results is also given in the paper.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.