International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 105 | Views: 306

Survey Paper | Information Technology | India | Volume 3 Issue 11, November 2014 | Popularity: 6.9 / 10


     

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav


Abstract: As Wireless Sensor Networks are proceeding towards wide-spread deployment, security issues become a central issue. Assuring the security of communication and access control in Wireless Sensor Networks (WSNs) has huge importance. So far, huge research has focused on making Wireless Sensor Networks feasible and useful, and has not concentrated on security. A security technique, MoteSec-Aware, is presented based on the network layer for WSNs with concentrate on secure network protocol and data access control. For identifying the replay and jamming attacks focused around the symmetric key cryptography utilizing AES as a part of OCB mode, a Virtual Counter Manager (VCM) with a synchronized incremental counter is introduced in the secure network protocol of MoteSec-Aware. The Key-Lock Matching (KLM) system to stop unauthorized access is investigated for access control. MoteSec-Aware is built for the TelosB model sensor platform running TinyOS 1.1.15, and conduct field tests and TOSSIM-based simulations to assess the performance of MoteSec-Aware. The results show that MoteSec-Aware expends substantially less energy, yet accomplishes higher security levels than a number of state-of-the-art techniques.


Keywords: Wireless Sensor Networks, Security, Replay attacks, Jamming attacks


Edition: Volume 3 Issue 11, November 2014


Pages: 2849 - 2851



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Tabbasum Sajjan Magdum, Y.B.Gurav, "A Survey on Secure Mechanism for Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2849-2851, https://www.ijsr.net/getabstract.php?paperid=OCT141614



Similar Articles

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 7, July 2022

Pages: 133 - 137

Wearable Computers of Leading Edge Generation and their Mystifying Mechanic's

Smital Wagh, Gunjan Behl

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024

Pages: 661 - 664

Revolutionizing Public Health: A Blockchain - Based System for Secure Genetic and Medical Data Management

Kunal Dhanda, Sweta Sehrawat

Share this Article

Downloads: 0

Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1597 - 1600

Real - Time Monitoring and Alerting Systems for Fintech

Ankur Mahida

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 8, August 2021

Pages: 1296 - 1304

Hybrid Cloud: Combining the Best of Both Worlds: Increased Adoption of Hybrid Cloud Solutions

Sandeep Chinamanagonda

Share this Article



Top