Linciya, T.; Anandkumar, K. M.
April 2013
International Journal of Wireless & Mobile Networks;Apr2013, Vol. 5 Issue 2, p81
Academic Journal
Recent developments on Wireless Sensor Networks have made their application in a wide range such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on. Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh, unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves the authorization of admittance to data in a network. The problem of authentication and pair wise key establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks. In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys are used authenticate and initiate data communication with sensor node. To determine the above problem the system adduces the three-tier security framework for authentication and pair wise key establishment between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution scheme for the sensor networks which handles sink mobility and continuous data delivery to the neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is used to encrypt the data and Mutual authentication scheme is proposed for the identification and isolation of replicated mobile sink from the network.


Related Articles

  • A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography. Rajendiran, Kishore; Sankararajan, Radha; Palaniappan, Ramasamy // ETRI Journal;Oct2011, Vol. 33 Issue 5, p791 

    Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to...

  • An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks. Muhammad, K.; Jan, Z.; Ahmad, J.; Khan, Z. // Technical Journal of University of Engineering & Technology Taxi;2015, Vol. 20 Issue 3, p48 

    Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, different techniques of compression and clustering have been used. However, security...

  • Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey. LABRAOUI, NABILA; GUERROUI, MOURAD; ALIOUAT, MAKHLOUF; ZIA, TANVEER // Adhoc & Sensor Wireless Networks;2011, Vol. 12 Issue 3/4, p295 

    No abstract available.

  • Challenges and Surveys in Key Management and Authentication Scheme for Wireless Sensor Networks. Lalitha, T.; Uma rani, R. // Australian Journal of Basic & Applied Sciences;2014 Special, Vol. 8 Issue 8, p105 

    Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to large number of sensor nodes and lack of information...

  • AREVIEW OF SECURITY ATTACKS AND INTRUSION DETECTION SCHEMES IN WIRELESS SENSOR NETWORK. MALEH, Yassine; Ezzati, Abdellah // International Journal of Wireless & Mobile Networks;Dec2013, Vol. 5 Issue 6, p79 

    Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs have a wide range of potential applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor...

  • Comments on He et al.'s robust biometric-based user authentication scheme for WSNs. Eun-Jun Yoon; Kee-Young Yoo // World Academy of Science, Engineering & Technology;2012, Issue 68, p52 

    In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers' attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper...

  • A New Data Aggregation Scheme to Support Energy Efficiency and Privacy Preservation for Wireless Sensor Networks. Min Yoon; Yong-Ki Kim; Jae-Woo Chang // International Journal of Security & Its Applications;Jan2013, Vol. 7 Issue 1, p129 

    Because a sensor node has limited resources, such as battery capacity, data aggregation techniques have been proposed for wireless sensor networks (WSNs). On the other hand, the provision of efficient data aggregation for preserving data privacy is challenging issue in WSNs. Existing data...

  • Analysis and Improvements of a Light-weight Authentication Scheme for Wireless Sensor Networks. Liang Hu; Ling Chi; Hong-tu Li; Wei Yuan; Yu Sun; Jian-feng Chu // Journal of Convergence Information Technology;Jul2012, Vol. 7 Issue 13, p66 

    Now, security plays an important role in wireless sensor networks architecture. Dr. Oscar proposed a light-weight authentication scheme for wireless sensor networks. In this paper, we show that there are some security flaws in Oscar's light-weight authentication scheme: an attacker and a sensor...

  • A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks. Kim, Jangseong; Kim, Kwangjo // Telecommunication Systems;Feb2013, Vol. 52 Issue 2, p1377 

    The previous schemes of key establishment in the wireless sensor networks may not be employed for the mission-critical application due to several limitations: lightweightness and scalability from the point of performance, vulnerabilities against node compromise and various existing attacks from...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics