Securing the Network using Asymmetric Key
Keywords:
Security, prevention and detection mechanism, asymmetric key distribution, malicious nodes, Authentication, Integrity, heterogeneous networkAbstract
Sensor network is comprised of set of nodes deployed in the environment which needs to be monitored. These nodes play
a vital role by monitoring unsupervised environment and sending the sensed data to the pre-defined location. These nodes press
the panic button in case of emergencies. Hence these nodes can be deployed in any application ranging from simple to hazardous
environment. These nodes are not tamper resistant and hence can’t tackle the treats induced by the intruders in the network.
In this study, asymmetric key distribution management is being utilized to enforce better security in the network. The
study combines the advantages of symmetric and asymmetric key distribution management. The paper increases the security
measures by implementing better algorithm. The attacks addressed in this paper includes sinkhole attack, wormhole attack and
Sybil attack are being tackled. The paper enhances security by providing backward and forward secrecy. In addition the study
enforces authentication and integrity to the data in the network.


