CFP last date
20 May 2024
Reseach Article

Implementing Data Security in Wireless Sensor Networkís through Location Aware Multifunctional Key Management Framework

by V. Prema Tulasi, Prof. D. Durga Bhavani, Prof. Dr. CH.G.V.N.Prasad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Number 1
Year of Publication: 2011
Authors: V. Prema Tulasi, Prof. D. Durga Bhavani, Prof. Dr. CH.G.V.N.Prasad
10.5120/1746-2379

V. Prema Tulasi, Prof. D. Durga Bhavani, Prof. Dr. CH.G.V.N.Prasad . Implementing Data Security in Wireless Sensor Networkís through Location Aware Multifunctional Key Management Framework. International Journal of Computer Applications. 13, 1 ( January 2011), 13-22. DOI=10.5120/1746-2379

@article{ 10.5120/1746-2379,
author = { V. Prema Tulasi, Prof. D. Durga Bhavani, Prof. Dr. CH.G.V.N.Prasad },
title = { Implementing Data Security in Wireless Sensor Networkís through Location Aware Multifunctional Key Management Framework },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 13 },
number = { 1 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 13-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume13/number1/1746-2379/ },
doi = { 10.5120/1746-2379 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:36.699753+05:30
%A V. Prema Tulasi
%A Prof. D. Durga Bhavani
%A Prof. Dr. CH.G.V.N.Prasad
%T Implementing Data Security in Wireless Sensor Networkís through Location Aware Multifunctional Key Management Framework
%J International Journal of Computer Applications
%@ 0975-8887
%V 13
%N 1
%P 13-22
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As wireless sensor network’s (WSN’s) consists of large number of nodes which are deployed in unattended/hostile environments and are exposed to different types of attacks due to compromisation of node or group of nodes. Usually, security designs provide a hop-by-hop security paradigm and are vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption and selective forwarding, puts data availability at stake. In this paper, we overcome these vulnerabilities for large-scale static WSN’s by using Location aware multifunctional key management framework. Sensors will be deployed in some area in a grid type model and knows its position based on X and Y coordinates in the grid. Further, embed the location information of each sensor into few of its secret keys which are owned by that sensor node and location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. This framework assures both node-to-sink and node-to-node authentication along the report forwarding routes and demonstrates that this design is highly resilient against an increasing number of compromised nodes and effective in energy savings by avoiding DoS attacks.

References
  1. D. Carman, P. Kruus, and B. Matt, “Constraints and Approaches for Distributed Sensor Network Security,” Technical Report 00-010, NAI Labs, 2000.
  2. A. Wood and J. Stankovic, “Denial of Service in Sensor Networks,”Computer, Oct. 2002.
  3. C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Ad Hoc Networks, vol. 1, no. 2, 2003.
  4. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, “SPINS:Security Protocols for Sensor Networks,” Proc. MobiCom, July 2001.
  5. E. Shi and A. Perrig, “Designing Secure Sensor Networks,” Wireless Comm. Magazine, vol. 11, no. 6, Dec. 2004.
  6. S. Capkun and J.P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE J. Selected Areas in Comm., Feb. 2006
  7. H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, pp. 103-105, Oct. 2003.
  8. S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data inSensor Networks,” Proc. IEEE Symp. Security and Privacy, May2004.
  9. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” Proc. IEEE INFOCOM, Mar. 2004.
  10. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” Proc. ACM MobiHoc, 2005.
  11. L.Lazos and Poovendran,“Serloc:SecureRange-Independent Localization for Wireless Sensor Networks,” Proc. ACM Int’l Conf.Mobile Computing and Networking (WiSe ’04), Oct. 2004.
  12. W. Du, J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
  13. kun Ren,Wenjing Lou,Yanchao Zhang.”LEDS:Providing location Aware end to end data security in wireless sensor networks” IEEE Transactions vol.7 no.5.May.2008.
  14. Steve Friedl's Unixwiz.net Tech Tips An Illustrated Guide to Cryptographic Hashes
  15. Federal Information Processing Standards publications The Keyed-Hash Message Authentication Code(HMAC)
  16. Network Security Essentials by William Stallings.
  17. Copy right owner source institute written by paranoia.
Index Terms

Computer Science
Information Sciences

Keywords

Sensors Hop-by-Hop Sink Report Forwarding Route Selective Forwarding Attack Report Disruption Attack