Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2012, Procedia Technology
…
10 pages
1 file
Due to significant advances in miniaturization, low power circuit design but reasonably efficient to carry the sensitive information through wireless communication, wireless sensor network (WSN) have attracted attention a lot in recent years.
IGI Global eBooks, 2010
Significant advancements in hardware technology have propelled the existence of Wireless Sensor Network (WSN). A WSN consists of simple, low cost yet powerful sensors. Each sensor has the ability to sense, process, and communicate data collected from the environment, in which it is deployed. Sensors usually draw energy from a small battery, and thus energy efficiency emerges as the key issue in any WSN. The basic idea of a
2018
A wireless network consisting multiple (ranging from a few hundreds to thousands) nodes which are sparsely dispersed and have dedicated sensors for monitoring, recording, detecting environment and gathering environmental data (e.g. light, sound, temperature, pressure, wind speed, directions, motion, etc.) is usually known as a Wireless Sensor Network (WSN). These nodes are self-organizing and are not controlled by a central administrator. The wide adoption and deployment rate of WSN is as a result of the processing power, wireless communication and the sensing technology that the WSN possesses. The numerous advantages this network holds has led to its growth. As the deployment and acceptability of WSN increases, the vulnerability to attacks is increasing hence the need for effective security mechanisms. Encryption has proven to be a reliable way of data protection hence its adoption in the improvement of the security level in WSNs. Identifying suitable encryption mechanism for WSNs ...
In the near future wireless sensor networks are expected to become increasingly popular due to their low cost and ease use. As a distributed systems, they are usually deployed in unattended and hostile environment which makes them vulnerability to “man in the middle attack” since the medium they are using could not be restricted. The only way to protect the content from being exposed to the adversary is by using cryptography. Most often the public key and the symmetric key encryption are used. However the cryptographic algorithms are processor and memory demanding. When using wireless sensor networks (WSN) we need to consider the aspects of protecting communication among the nodes. We are investigating the possible attacks and suggest our adaptive holistic approach to secure the network while minimizing the cost.
The future developments of the wireless sensor networks and its applications demands for the efficient and secure communication. For the solution of efficient and reliable security needs cryptography algorithms provides good solutions. For providing reliable security schemes mainly data confidentiality now-a-days key management is used. This paper provides a review over cryptography schemes being used to deal with security issues of wireless sensor networks.
Sensors, 2015
Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes.
International Journal of Communication Networks and Distributed Systems, 2013
A wireless sensor network (WSN) consists of a large number of resource constrained sensor nodes, usually deployed in hostile environments, where they face a variety of malicious attacks. To address the security vulnerabilities in WSN, this paper proposes an efficient security framework (ESF), which comprises of two security building blocks. The first one security building block is to establish key between the sending and receiving nodes while other component provides confidentiality and integrity of data. Owing to the limited resources available with the sensor nodes, ESF avoids intensive computations like public key cryptography and encryption mechanisms. Analysis of ESF shows that the framework provides a secure environment and resistant against the wireless threats using simple bit-wise operations and cryptographic hash functions.
ArXiv, 2021
Cryptography techniques are essential for a robust and stable security design of a system to mitigate risk of external attacks and thus improve its efficiency. Wireless Sensor Networks (WSNs) play a pivotal role in sensing, monitoring, processing and accumulating raw data to enhance the performance of the actuators, microcontrollers, embedded architectures, IoT devices and computing machines to which they are connected. With so much threat of potential adversaries, it is essential to scale up the security level of WSN without affecting its primary goal of seamless data collection and communication with relay devices. This paper intends to explore the past and ongoing research activities in this domain. An extensive study of these algorithms referred here, are studied and analysed. Based on these findings this paper will illustrate the best possible cryptography algorithms which will be most suited to implement the security aspect of the WSN and protect it from any threat and reduce ...
International Journal of Electrical and Computer Engineering (IJECE), 2020
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
International Journal of Internet Technology and Secured Transactions, 2010
The adoption and widespread deployment of wireless sensor networks means that security issues are of critical concern. To date, much research has focused on the usability of these networks in a variety of environments where conventional wired networks may not be feasible. However, less emphasis was placed on the security issues of employing a sensor network and its exposure to potential threats. Due to the severe physical constraints in sensor nodes, traditional cryptographic mechanisms are not suitable to deal with such potential security threats. This paper proposes a secure lightweight architecture that takes account of the constraints of sensor networks. With the use of a base station, a hierarchical network topology is formed that enables end-to-end communication between sensor nodes with the aid of intermediary nodes where necessary. The architecture also supports the detection and isolation of aberrant nodes.
International Journal of Advance Research, Ideas and Innovations in Technology, 2017
Application of wireless sensor networks (WSN) to commercial, home environments and military purpose are increased in wide range. As the wireless sensor networks continue to grow, they are vulnerable to attacks and hence need for security mechanisms. Identifying suitable cryptography for WSN is important challenge due to limitation of energy, computation capacity and storage resources of sensor nodes. For this purpose, Cryptography plays a vital role in securing the data in W SN. In this paper we implemented two symmetric cryptographic algorithms algorithms: block cipher AES (Advanced encryption standards) and the Lightweight block cipher PRESENT. Our main aim of implementing the symmetric cryptographic algorithms in sensor nodes to provide secure communication which guarantees the confidentiality, integrity and avoids key exchange via unsecured channel that impose real threats. The experimental results are carried by implementing these algorithms in Atmega 32 bit microcontroller usi...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
crecollege.tripod.com
Computer Communications, 2006
International Journal of Engineering Research and Technology (IJERT), 2014
International Journal of Distributed Sensor Networks, 2013
International Journal of Engineering and Management Research, 2012
Bulletin of Electrical Engineering and Informatics, 2021
International Journal of Electrical and Computer Engineering (IJECE), 2017
Computer Science & Engineering: An International Journal, 2012