CFP last date
22 April 2024
Reseach Article

A Framework to prevent Mobile sinks accessing by Unauthorized Nodes in WSN

Published on None 2010 by Abhishek Pandey, Neeraj Kumar, R. C. Tripathi
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 1
None 2010
Authors: Abhishek Pandey, Neeraj Kumar, R. C. Tripathi
370d86c5-d1d3-494e-80ce-6285dedee2da

Abhishek Pandey, Neeraj Kumar, R. C. Tripathi . A Framework to prevent Mobile sinks accessing by Unauthorized Nodes in WSN. Mobile Ad-hoc Networks. MANETS, 1 (None 2010), 13-17.

@article{
author = { Abhishek Pandey, Neeraj Kumar, R. C. Tripathi },
title = { A Framework to prevent Mobile sinks accessing by Unauthorized Nodes in WSN },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 1 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 13-17 },
numpages = 5,
url = { /specialissues/manets/number1/1013-53/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A Abhishek Pandey
%A Neeraj Kumar
%A R. C. Tripathi
%T A Framework to prevent Mobile sinks accessing by Unauthorized Nodes in WSN
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 1
%P 13-17
%D 2010
%I International Journal of Computer Applications
Abstract

Due to resource constraint nature of sensor nodes, the network suffers by computation and security problems. These nodes create a wireless sensor network that used sink stable or mobile as per required applications. Therefore, various traditional security techniques of the traditional networks are not possible to be applied on this network. To overcome the security problem in this ad-hoc or wireless sensor network, the current model has proposed a framework known as sink security model to secure mobile sink node with the help of an algorithm. This algorithm provides ability to mobile sink for deciding the correct situation about data reception using the past record.

References
  1. S. Misra, A. Vaish, “Reputation-based role assignment for role-based access control in wireless sensor networks”, journal of Computer Communications of Elsevier (2010), 2010.02.013.
  2. S.Misra, S.K.Dhurandher,A.Rayankula and D.Agrawal, “Using Honeynodes for defense against jamming attacks in wirelessinfrastructure-basednetworks”; Computers & Electrical Engineering Volume 36, Issue 2, Pages 367-382, Wireless ad hoc, Sensor and Mesh Networks, March 2010.
  3. G.Zhan,W.Shi and J. Deng, “Poster Abstract: Sensor Trust - A Resilient Trust Model for WSNs” SenSys’09, November 4–6, 2009, Berkeley, CA,USA.ACM 978-1-60558- 748-6
  4. W.C. Yang, Y.Y. Zhang, K.B.Kim, J.H.Kim, M.S.Park, “SCAF: a secure cluster-based architecture formation scheme for wireless sensor network”, in: Proc. 4th IEEE International Conference on Circuits and Systems for Communications (ICCSC 2008), May, 2008, pp. 843–847..
  5. B.Panja, S.K. Madria, B.Bhargava, “A role-based access in a hierarchical sensor network architecture to provide multilevel security”, Computer Communications 31 (4) (2008) 793– 806.
  6. Y.Shen, J.Ma, Q.Pei,“An access control scheme in wireless sensor network”, in: Proc. 4th IFIP International Conference on Network and Parallel Computing Workshops(NPC 2007), Dalian,China, September, 2007, pp. 362–367.
  7. Y. Zhou, Y. Zhang, Y. Fang, “Access control in wireless sensor networks”, Ad Hoc Networks 5 (1) (2007) 3–13.
  8. G.V.Crosby, N. Pissinou, “Cluster- based reputation and trust for wireless sensor networks”, in: Proc.4th Consumer Communications and Networking Conference (CCNC 2007), January, 2007, pp. 604–608.
  9. A. Boukerche, X. Li, An agent-based trust and reputation management scheme for wireless sensor networks, in: Proc. IEEE Global Telecommunications Conference, 28 November–2 December, 2005, pp. 1857–1861.
  10. S.Muhammad, Z.Furqan andR.K.Guha, "Wireless Sensor Network Security: A Secure Mobile sink Node Architecture". In Proceedings of the 24th IEEE International Performance Computing and Comm. Conference (IPCCC), Arizona, USA, April 2005,pp.371-376.
  11. C. Karlof, N. Sastry, and D.Wagner, “ tinySec: A Link Layer Security Architecture for Wireless Sensor Networks,” in Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Nov. 2004.
  12. S. Zhu, S. Xu, S. Setia, and S.Jajodia,“LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks”, Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW’03) , May 2003.
  13. M.Bellare, J.Kilian, F.Rogaway, “The security of cipher block chaining message authentication code”,crypto94 proceedings, Lecture note in computer science vol. 839, 1999.
  14. C.Burattiy, F.Cuomo, S.Della, Luna, U. Monaco, J.Orrissx, R.Verdoney; “Optimum Tree-Based Topologies for Multi- Mobile sink Wireless Sensor Networks Using IEEE 02.15.4”
Index Terms

Computer Science
Information Sciences

Keywords

Security threats adversary NS-2 Mica2 Mica2Dot