An Adaptable Security Framework for Wireless Sensor Networks
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.15, No. 4)Publication Date: 2016-03-30
Authors : Hesham A. El Zouka;
Page : 4898-4906
Keywords : Security; Authentication; Routing; Energy efficient; Agent-based architecture; Key management schemes.;
Abstract
The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. Several possible approaches are suggested to improve the security, authentication protocols, and key management schemes in WSNs. Furthermore, utilizing the existing security protocols in wireless sensor networks has led us to propose a secure framework which incorporates security protocols in a way that minimizes the energy consumption of the sensor nodes. Our algorithm ensures data confidentiality, node authentication, and data integrity while remaining within acceptable memory, time and energy constrains.
Other Latest Articles
- Pso Optimization algorithm for Task Scheduling on The Cloud Computing Environment
- Rearranging the pixel using Log-Cumulant Parameter Estimator and Healing of Restoration Technique
- Performance Effects of Current Consumption on Radio Receiver Bit Error Rate in IEEE 802.15.4 for Wireless Sensor Networks
- Performance Evaluation of Distributed Database Systems
- The New Image Encryption and Decryption Using Quasi Group
Last modified: 2014-08-10 22:41:21