CFP last date
20 May 2024
Reseach Article

Securing Wireless Sensor Network using Intelligent Techniques

by K. Priyadharshini, G. Hemalatha, K. Selvamani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 18
Year of Publication: 2013
Authors: K. Priyadharshini, G. Hemalatha, K. Selvamani
10.5120/12164-7784

K. Priyadharshini, G. Hemalatha, K. Selvamani . Securing Wireless Sensor Network using Intelligent Techniques. International Journal of Computer Applications. 70, 18 ( May 2013), 1-6. DOI=10.5120/12164-7784

@article{ 10.5120/12164-7784,
author = { K. Priyadharshini, G. Hemalatha, K. Selvamani },
title = { Securing Wireless Sensor Network using Intelligent Techniques },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 18 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number18/12164-7784/ },
doi = { 10.5120/12164-7784 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:09.431937+05:30
%A K. Priyadharshini
%A G. Hemalatha
%A K. Selvamani
%T Securing Wireless Sensor Network using Intelligent Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 18
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wireless sensor networks (WSNs), the sensor nodes transmit critical information over the network. Therefore security services such as authentication and pair wise key establishment between sensor nodes and mobile sinks are important. However, the problem of authentication and pair wise key establishment in sensor networks with mobile sinks is still a critical problem in the face of mobile sink replication attacks. In the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes. This makes it possible for an attacker to take control over the entire network. Thereby deploying a replicated mobile sink, preloaded with some compromised keys to authenticate and initiate data communication with any sensor node. To address this issue a general framework needs to be developed that permits the use of any pair wise key pre distribution scheme which requires two separate key pools one for the mobile sink to access the network and other for the pair wise key establishment between the sensors. Moreover, to detect such mobile sinks and replication attacks an intelligent agent is deployed at every level in the network. The agents play a major role and perform with the idea of knowledge base and rule manager.

References
  1. Akyildiz, F. , Su, W. , Sankarasubramaniam, Y. and Cayirci, E. 2002 'Wireless sensor networks: a survey. Computer Networks, Vol. 38, pp. 393–422.
  2. Rasheed, A. A. and Mahapatra, R. N. 2012 'The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks. IEEE Transactions on parallel and distributed systems, Vol. 23, pp. 958?965.
  3. Blundolz, C. , De Santis, A. , Herzberg, A. , Kutten, S. , Vaccaro, U. and Yung, M. 1993 'Perfectly-Secure Key Distribution for Dynamic Conferences", Bnckell E. F. (Ed. ): Advances in Cryptology - CRYPT0 '92, LNCS 740, pp. 471?486.
  4. Chen, M. , Kwon, T. , Yuan, Y. and Leung, V. C. M. 2006 'Mobile Agent Based Wireless Sensor Networks. Journal of Computers, Vol. 1, pp. 14?21.
  5. Ota, K. , Dong, M. and Li, X. 2009 'TinyBee: Mobile-Agent-Based Data Gathering System in Wireless Sensor Networks', IEEE Int'l Conf. on Networking, Architecture, and Storage.
  6. Rasheed, A. A. and Mahapatra, R. N. 2007 'An Energy-Efficient Hybrid Data Collection Scheme in Wireless Sensor Networks', Proc. Third IEEE Int'l Conf. Intelligent Sensors, Sensor Networks and Information Processing, pp. 703?708.
  7. Rasheed, A. A. and Mahapatra, R. N. 2008 'An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks', Proc. 27th IEEE Int'l Performance Computing and Comm. Conf. (IPCCC '08), pp. 264?270 .
  8. Tynan, R. , Marsh, D. , O'Kane, D. and O'Hare, G. M. P. 2005 'Intelligent Agents for Wireless Sensor Networks', Fourth Int'l Joint Conf. on Autonomous Agents and Multiagent Systems 2005 (AAMAS '05), pp. 1179?1180.
  9. Rasheed, A. and Mahapatra, R. 2008 'An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks', Proc. IEEE 27th Int'l Performance Computing and Comm. Conf. (IPCCC '08), pp. 264?270.
  10. Rasheed, A. and Mahapatra, R. 2009 'A Key Pre-Distribution Scheme for Heterogeneous Sensor Networks', Proc. Int'l Conf. Wireless Comm. and Mobile Computing Conf. (IWCMC '09), pp. 263?268.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Intelligent Agent Mobile Sink Rule Manager Replication Attack