58,353 research outputs found

    Different Security Mechanisms for Wireless Sensor Networks

    Get PDF
    In today’s world security becomes one of the important constraints in every research field. As increasing use of Wireless Sensor Networks (WSN) in various crucial applications security of wireless networks is becoming more important day by day. Today almost each and every important area makes use of wireless sensor networks. As Wireless Sensor Network is infrastructure-less network; data moves openly from one node to another thus it can be captured easily by attackers. To avoid data from being stolen security mechanism has to be applied. Many protocols are available for providing security on wireless network. We perform a detailed study of different security mechanisms used in sensor network against some criteria such as nature of algorithm, working, its benefits and some of the disadvantages of mechanism and also compare them

    A Framework for Secure and Survivable Wireless Sensor Networks

    Get PDF
    Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. A wireless sensor network (WSN) is vulnerable to security attacks due to the insecure communication channels, limited computational and communication capabilities and unattended nature of sensor node devices, limited energy resources and memory. Security and survivability of these systems are receiving increasing attention, particularly critical infrastructure protection. So we need to design a framework that provide both security and survivability for WSNs. To meet this goals, we propose a framework for secure and survivable WSNs and we present a key management scheme as a case study to prevent the sensor networks being compromised by an adversary. This paper also considers survivability strategies for the sensor network against a variety of threats that can lead to the failure of the base station, which represents a central point of failure.key management scheme, security, survivability, WSN

    A Study of Attack Detection and Localization Scheme Using Enhanced Hash Technique

    Get PDF
    Security plays an vital role in wireless sensor networks. The nodes are deployed in the physical environment. Hackers may easily access the data. In order to provide security, The Advanced Encryption Standard (AES) algorithm has developed into an option for various security services. Sensor nodes collect the data from the environment and send to sink. But attackers corrupt data while transmitting therefore data security is main concern of wireless sensor network (WSN). Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due to the ad-hoc nature and openness of wireless sensor networks, they are susceptible to the identity based attack. In this paper, we study on a process of named Attack Detection and Localization Scheme to detect and localize the identity based attacks. An improved algorithm for hashing has been proposed. We named it as Effective Hashing Technique (EHT).It generates the Hash keys to differentiate an attacker from a normal node and to reduce the occurrences of any false positives or negatives. Also, our localization algorithm efficiently finds out the position estimates for the nodes

    Swarm Intelligence-Optimized Energy Management for Prolonging the Lifetime of Wireless Sensor Networks

    Get PDF
     Recent technological and industrial progress has enabled the development of small, high-performing, energy-saving, affordable sensor nodes that possess the potential to adapt, be self-aware, and self-organize. These nodes are designed for versatile communications applications. Sensor networks for sustainable development focus on the ways in which sensor network technology can enhance social development and improve living standards without causing harm to the environment or depleting natural resources. Wireless sensor networks (WSNs) offer undeniable benefits in various fields, including the military, healthcare, traffic monitoring, and remote image sensing. Given the constraints of sensor networks, varying degrees of security are necessary for these critical applications, posing difficulties in the implementation of conventional algorithms. The issue of security has emerged as a primary concern in the context of IoT and smart city applications. Sensor networks are often regarded as the fundamental building blocks of IoTs and smart cities. The WSN encompasses a routing algorithm, network strength, packet loss, energy loss, and various other intricate considerations. The WSN also addresses intricate matters such as energy usage, a proficient approach for picking cluster heads, and various other concerns. The recent growth of Wireless Sensor Networks (WSNs) has made it increasingly difficult to ensure the trustworthiness and reliability of data due to the distinct features and limitations of nodes. Hostile nodes can easily damage the integrity of the network by inserting fake and malicious data, as well as launching internal attacks. Trust-based security is employed to detect and identify rogue nodes, providing a robust and adaptable protection mechanism. Trust evaluation models are crucial security-enhancement mechanisms that enhance the reliability and collaboration of sensor nodes in wireless sensor networks. This study recommends the use of DFA UTrust, a unique trust technique, to effectively satisfy the security requirements of WSNs

    Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks

    Get PDF
    The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks. These security attacks occur when an adversary compromised a sensor node by inject false measurements and divert real time network traffic. Sinkhole and Blackhole attacks are very common attacks in network, where an attacker advertises un-authorized routing update in network. To deal with these types of attacks, there is a need to tighten the network security and prevent from attackers. In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network. The simulation results illustrated that, how these attacks affect the network performance

    Performance analysis of error detection and correction code for wireless sensor networks

    Full text link
    Recent advances in wireless communications and electronics have enabled the development of low-cost, low-power, self-organizational, multifunctional wireless sensor networks. Wireless sensor networks can be applied to a wide range of application areas including heath, military and homeland security, environment, industry and commercial, and home. A typical wireless sensor network consists of one or more sink nodes and a large number of sensor nodes scattered in a sensor field. Each of these sensor nodes is capable to collect the data and relay the data back to the sink through a multi-hop architecture. The key challenge in sensor networks is to overcome the energy constraint since each sensor node has limited power. Hence, it is important to minimize the energy used to transmit packets over wireless links; The data transmitted from the sensor nodes are vulnerable to be corrupted by errors induced by noisy channels and other factors. Hence it is necessary to provide a proper error control scheme to reduce the bit error rate (BER) to a desired level without sacrificing other performance. Energy required for error control code has a direct impact on battery power consumption. Since high error rates are inevitable in the wireless environment, energy efficient error detection and correction scheme is vital in wireless sensor networks. However, in the literature, limited work has been focused on the study of energy efficient error control scheme; This thesis is focused on energy-efficient error detection and correction schemes for wireless sensor networks. (Abstract shortened by UMI.)

    Reputation-based intrusion detection system for wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous studies in the field of security in sensor networks, being Intrusion Detection System (IDS) among the most used tools in this area. This study proposes a new IDS design based on reputation and trust of the different nodes of a network for decision-making and analysis of possible sources of malicious attacks

    A Comprehensive Study on Security in Wireless Sensor Networks(WSNs)

    Get PDF
    Wireless Sensor Networks(WSNs) are an important component of today\u27s ubiquitous and pervasive computing. Without WSNs, the applications aren\u27t as clever as they could be. Almost every scenario involving WSNs necessitates a quick and precise localization process. Existing frameworks and algorithms, on the other hand suffer from a significant disadvantage when it comes to beacon node trust, which is a critical component in Wireless Sensor Network. For localization this has to be ensured.. This issue is addressed in our current solution. In the harsh environment of WSN operations, malicious nodes are inescapable. As a consequence, A technique has been proposed to find out the problem while simultaneously offering a safe trust based localization system. It focuses on the algorithm for assessing trust and the creation of blockchains. Every beacon node’s truth value(trust value) are determined using various trust criteria with the corresponding weights being dynamically changed during localization process. After that the most reliable beacon nodes are chosen for mining. This two-step process ensures that the blockchain is kept up to current, and that beacon nodes have consistent Tvalues(Trust values). We conducted a series of simulations to test the suggested algorithm’s performance and effectiveness. The accuracy of localization, harmful activity detection, the confusion matrixes are used to compare results

    Data aggregation in wireless sensor networks with minimum delay and minimum use of energy: A comparative study

    Get PDF
    Electronic Workshops in Computing (eWiC), 2015. First published in the Electronic Workshops in Computing series at http://dx.doi.org/10.14236/ewic/bcsme2014.2The prime objective of deploying large- scale wireless sensor networks is to collect information from to control systems associated with these networks. Wireless sensor networks are widely used in application domains such as security and inspection, environmental monitoring, warfare, and other situations especially where immediate responses are required such as disasters and medical emergency. Whenever there is a growth there are challenges and to cope with these challenges strategies and solutions must be developed. This paper discusses the recently addressed issues of data aggregation through presenting a comparative study of different research work done on minimizing delay in different structures of wireless sensor networks. Finally we introduce our proposed method to minimize both delay and power consumption using a tree based clustering scheme with partial data aggregation
    • …
    corecore