CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols

Published on May 2015 by Neethu Myshri R, A. Jayanthiladevi, T. Lalitha
An Architectural Framework for Workload Demand Prediction in Scalable Federated Clouds
Foundation of Computer Science USA
ICCTAC2015 - Number 1
May 2015
Authors: Neethu Myshri R, A. Jayanthiladevi, T. Lalitha
ba58692c-be1a-4743-aa3b-dfb968122657

Neethu Myshri R, A. Jayanthiladevi, T. Lalitha . Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols. An Architectural Framework for Workload Demand Prediction in Scalable Federated Clouds. ICCTAC2015, 1 (May 2015), 10-14.

@article{
author = { Neethu Myshri R, A. Jayanthiladevi, T. Lalitha },
title = { Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols },
journal = { An Architectural Framework for Workload Demand Prediction in Scalable Federated Clouds },
issue_date = { May 2015 },
volume = { ICCTAC2015 },
number = { 1 },
month = { May },
year = { 2015 },
issn = 0975-8887,
pages = { 10-14 },
numpages = 5,
url = { /proceedings/icctac2015/number1/20918-2005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 An Architectural Framework for Workload Demand Prediction in Scalable Federated Clouds
%A Neethu Myshri R
%A A. Jayanthiladevi
%A T. Lalitha
%T Challenges and Authentication in Wireless Sensor Networks by using promising Key Management Protocols
%J An Architectural Framework for Workload Demand Prediction in Scalable Federated Clouds
%@ 0975-8887
%V ICCTAC2015
%N 1
%P 10-14
%D 2015
%I International Journal of Computer Applications
Abstract

A network comprising of several minute wireless sensor nodes which are organized in a dense manner is called as a Wireless Sensor Network (WSN). Fig. 1 demonstrates the architecture of wireless sensor networks. Every node estimates the state of its surroundings in this network. The estimated results are then converted into the signal form in order to determine the features related to this technique after the processing of the signals. Based on the multi hop technique, the entire data that is accumulated is directed towards the special nodes which are considered as the sink nodes or the Base Station (BS). The user at the destination receives the data through the internet or the satellite via gateway. The use of the gateway is not very necessary as it is reliant on the distance between the user at the destination and the network [1]. Usually; the sensor network consists of a huge group of distributed minimum power sensors disseminated over the area which is to be supervised. The sensors possess the capability of collecting the data, processing and then forwarding it to the central node for additional processing [2]. The applications of WSNs include environmental monitoring, health, surveillance, catastrophe monitoring, structural monitoring, security, military, industry, agriculture, home, traffic monitoring, etc. When the sensor network is deployed in the battlefield, every data from sink node, reports of every data from sensor nodes to central node, message swapped between sensor nodes need to be encrypted for safeguarding the message from probable eavesdroppers [2]. For supervising the physical world, the wireless sensor networks are the promising technology. In order to collect the data from the surrounding in a sensor network application, several minute sensor nodes are organized and collaborated. Sensing modals like image sensors are placed in every node and this possess the ability to communicate in the wireless environment. The major merit of WSN is that it minimizes the application cost by deploying the several sensors with minimum communication cost and with base station offering full network function. [3].

References
  1. Lina M. Pestana Leão de Brito and Laura M. Rodríguez Peralta, (2008). An Analysis of Localization Problems and Solutions in Wireless Sensor Networks. Polytechnical Studies Review, Vol VI.
  2. D. Saravanan , D. Rajalakshmi and D. Maheswari, (2011), DYCRASEN: A Dynamic Cryptographic Asymmetric Key Management for Sensor Network using Hash Function. International Journal of Computer Applications, Volume 18– No. 8.
  3. Mohammed A. Abuhelaleh and Khaled M. Elleithy. (2010). Security in wireless sensor networks: Key management module in SOOAWSN. International Journal of Network Security & Its Applications (IJNSA), Vol. 2, No. 4.
  4. John A. Clark, John Murdoch, John A. McDermid, Sevil Sen, Howard R. Chivers, Olwen Worthington and Pankaj Rohatgi (2007). Threat Modelling for Mobile Ad Hoc and Sensor Networks. In Annual Conference of ITA.
  5. Yingpeng Sang and Hong Shen (2006). Secure Data Aggregation in Wireless Sensor Networks: A Survey (PDCAT).
  6. Jiyong Jang, Taekyoung Kwon and Jooseok Song (2007). A Time-Based Key Management Protocol for Wireless Sensor Networks (ISPEC), pp 314-328
  7. Binod Vaidya, Min Chen and Joel J. P. C. Rodrigues (2009). Improved Robust User Authentication Scheme for Wireless Sensor Networks. Fifth IEEE Conference on Wireless Communication and Sensor Networks(WCSN).
Index Terms

Computer Science
Information Sciences

Keywords

Senor Key Wireless Security Protocols