Simulation of key management protocol in wireless sensor networks

  • Yuling He*
  • , Yun Pan
  • , Ping Pan
  • , Licheng Wang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Wireless sensor networks are widely used both in the civil and military fields. Large-scale sensor nodes are usually deployed in potentially adverse or even hostile environment, so the security in these networks is very important. The design for key management protocol is one of the most important aspects and basic research field of secure wireless sensor networks. The key management in wireless sensor network meets many new challenges due to its intrinsic properties. In this paper, a key management protocol base on LEACH routing protocol is proposed, and simulation on the protocol is conducted by using NS2. Finally, the impacts on these simulation results in different network settings are presented.

Original languageEnglish
Title of host publicationProceedings of the 2009 International Joint Conference on Computational Sciences and Optimization, CSO 2009
Pages333-335
Number of pages3
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 International Joint Conference on Computational Sciences and Optimization, CSO 2009 - Sanya, Hainan, China
Duration: 24 Apr 200926 Apr 2009

Publication series

NameProceedings of the 2009 International Joint Conference on Computational Sciences and Optimization, CSO 2009
Volume2

Conference

Conference2009 International Joint Conference on Computational Sciences and Optimization, CSO 2009
Country/TerritoryChina
CitySanya, Hainan
Period24/04/0926/04/09

Fingerprint

Dive into the research topics of 'Simulation of key management protocol in wireless sensor networks'. Together they form a unique fingerprint.

Cite this