Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols

Print
PDF
International Conference on Current Trends in Advanced Computing (ICCTAC-2015)
© 2015 by IJCA Journal
ICCTAC 2015 - Number 1
Year of Publication: 2015
Authors:
Neethu Myshri R
A. Jayanthiladevi
T. Lalitha

Neethu Myshri R, A Jayanthiladevi and T Lalitha. Article: Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols. International Conference on Current Trends in Advanced Computing (ICCTAC-2015) ICCTAC 2015(1):10-14, May 2015. Full text available. BibTeX

@article{key:article,
	author = {Neethu Myshri R and A. Jayanthiladevi and T. Lalitha},
	title = {Article: Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols},
	journal = {International Conference on Current Trends in Advanced Computing (ICCTAC-2015)},
	year = {2015},
	volume = {ICCTAC 2015},
	number = {1},
	pages = {10-14},
	month = {May},
	note = {Full text available}
}

Abstract

A network comprising of several minute wireless sensor nodes which are organized in a dense manner is called as a Wireless Sensor Network (WSN). Fig. 1 demonstrates the architecture of wireless sensor networks. Every node estimates the state of its surroundings in this network. The estimated results are then converted into the signal form in order to determine the features related to this technique after the processing of the signals. Based on the multi hop technique, the entire data that is accumulated is directed towards the special nodes which are considered as the sink nodes or the Base Station (BS). The user at the destination receives the data through the internet or the satellite via gateway. The use of the gateway is not very necessary as it is reliant on the distance between the user at the destination and the network [1]. Usually; the sensor network consists of a huge group of distributed minimum power sensors disseminated over the area which is to be supervised. The sensors possess the capability of collecting the data, processing and then forwarding it to the central node for additional processing [2]. The applications of WSNs include environmental monitoring, health, surveillance, catastrophe monitoring, structural monitoring, security, military, industry, agriculture, home, traffic monitoring, etc. When the sensor network is deployed in the battlefield, every data from sink node, reports of every data from sensor nodes to central node, message swapped between sensor nodes need to be encrypted for safeguarding the message from probable eavesdroppers [2]. For supervising the physical world, the wireless sensor networks are the promising technology. In order to collect the data from the surrounding in a sensor network application, several minute sensor nodes are organized and collaborated. Sensing modals like image sensors are placed in every node and this possess the ability to communicate in the wireless environment. The major merit of WSN is that it minimizes the application cost by deploying the several sensors with minimum communication cost and with base station offering full network function. [3].

References

  • Lina M. Pestana Leão de Brito and Laura M. Rodríguez Peralta, (2008). An Analysis of Localization Problems and Solutions in Wireless Sensor Networks. Polytechnical Studies Review, Vol VI.
  • D. Saravanan , D. Rajalakshmi and D. Maheswari, (2011), DYCRASEN: A Dynamic Cryptographic Asymmetric Key Management for Sensor Network using Hash Function. International Journal of Computer Applications, Volume 18– No. 8.
  • Mohammed A. Abuhelaleh and Khaled M. Elleithy. (2010). Security in wireless sensor networks: Key management module in SOOAWSN. International Journal of Network Security & Its Applications (IJNSA), Vol. 2, No. 4.
  • John A. Clark, John Murdoch, John A. McDermid, Sevil Sen, Howard R. Chivers, Olwen Worthington and Pankaj Rohatgi (2007). Threat Modelling for Mobile Ad Hoc and Sensor Networks. In Annual Conference of ITA.
  • Yingpeng Sang and Hong Shen (2006). Secure Data Aggregation in Wireless Sensor Networks: A Survey (PDCAT).
  • Jiyong Jang, Taekyoung Kwon and Jooseok Song (2007). A Time-Based Key Management Protocol for Wireless Sensor Networks (ISPEC), pp 314-328
  • Binod Vaidya, Min Chen and Joel J. P. C. Rodrigues (2009). Improved Robust User Authentication Scheme for Wireless Sensor Networks. Fifth IEEE Conference on Wireless Communication and Sensor Networks(WCSN).