SlideShare a Scribd company logo
1 of 8
Download to read offline
http://www.iaeme.com/IJARET/index.asp 263 editor@iaeme.com
International Journal of Advanced Research in Engineering and Technology (IJARET)
Volume 10, Issue 2, March-April 2019, pp. 263-270. Article ID: IJARET_10_02_026
Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02
ISSN Print: 0976-6480 and ISSN Online: 0976-6499
© IAEME Publication
AN ADVANCED DATA SECURITY METHOD IN
WSN
Syeda Kausar Fatima,
Research Scholar Jntuh, Prof., Dcet, Hyderabad, Principal Nsakcet,
Prof., Ece Dept. Jntuh, India.
Dr. Syeda Gauhar Fatima,
Research Scholar Jntuh, Prof., Dcet, Hyderabad, Principal Nsakcet,
Prof., Ece Dept. Jntuh, India.
Dr. Syed Abdul Sattar
Research Scholar Jntuh, Prof., Dcet, Hyderabad, Principal Nsakcet,
Prof., Ece Dept. Jntuh, India.
Dr. Anita Sheela
Research Scholar Jntuh, Prof., Dcet, Hyderabad, Principal Nsakcet,
Prof., Ece Dept. Jntuh, India.
ABSTRACT
Recently, WSNs have drawn a lot of attention due to their broad applications in both
military and civilian domains. Data security is essential for success of WSN
applications, exclusively for those mission-critical applications working in unattended
and even hostile environments which may be exposed to several attacks. This inspired
the research on Data security for WSNs. Attacks due to node compromise include Denial
of service (DoS) attacks such as selective forwarding attacks and report disruption
attacks. Nearby many techniques have been proposed in the literature for data security.
Hop-hop security works well when assuming a uniform wireless communication pattern
and this security designs provides only hop-hop security. Node to sink communication
is the dominant communication pattern in WSNs and hop-hop security design is not
sufficient as it is exposed to several attacks due to node compromise. Location aware
end-end data security (LEDS) provides end-end security.
Keywords-Data security, end-to-end, DoS attack, wireless sensor network
Cite this Article: Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul
Sattar, And Dr. Anita Sheela, An Advanced Data Security Method in Wsn, International
Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 263-
270.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
An Advanced Data Security Method in Wsn
http://www.iaeme.com/IJARET/index.asp 264 editor@iaeme.com
1. INTRODUCTION
A wireless sensor network (WSN) is a wireless network comprising of a large number of
spatially distributed sensor nodes. These sensor nodes can be easily established at planned
regions at a low cost. Provided with various types of sensors, sensor nodes cooperate with each
other to monitor physical or environmental conditions, such as temperature, vibration, sound,
image, pressure, motion or pollutants. Each sensor node is equipped with a radio transceiver or
other wireless communication device, a microprocessor, and an energy source (e.g., a battery).
However, providing satisfactory security protection in WSNs has ever been a challenging task
due to various network & resource constraints and malicious attacks.
The sensor nodes and the base stations are the major elements of WSN. These both can be
abstracted as the ‘sensing cells’ and the ‘brain’ of the network, respectively. Security
compromise of sensor nodes is one of the most severe security threats in WSNs due to their
lack of tamper resistance [1]. In WSNs, the attacker could compromise multiple nodes to obtain
their carried keying material and control them and thus is able to intercept data transmitted
through these nodes thereafter. As the number of compromised nodes grows, communication
links between uncompromised nodes might also be compromised through malicious
cryptanalysis. Thus, this type of attack could lead to severe data confidentiality compromise in
WSNs. Furthermore, the attacker may use compromised nodes to inject bogus data traffic in
WSNs.
2. WIRELESS SENSOR NETWORK
Wireless sensor networks composed of a large number of sensor nodes. Sensor nodes are
typically small, low cost, low power devices. Sensor nodes perform the functionality such as
sense/monitor its local environment, perform limited data processing, and communicate on
short distance. A WSN usually also contains a “sink” node(s) which collects data from sensor
nodes and connects the WSN to the outside world. Wireless sensor networks (WSNs) are
rapidly growing in their importance and relevance to both the research community and the
public at large. A distributed wireless sensor network is formed by a large number of tiny and
inexpensive sensor nodes. These nodes are typically resource constrained, with limited energy
lifetime, low-power micro sensors and actuators, slow embedded processors, limited memory,
and low bandwidth radios.
Figure 1 Sensor network architecture.
The following unique features of WSNs make it particularly challenging to protect
communication security in WSNs.
A. Resource Constraints
Small sensors only have limited communication and computation capabilities, which makes it
difficult to implement expensive security operations for WSNs. This precludes the direct
transplantation of the existing security designs aimed for traditional wireless networks, where
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Dr. Anita Sheela
http://www.iaeme.com/IJARET/index.asp 265 editor@iaeme.com
network nodes are much more powerful devices. Sensor nodes are battery-powered, having
only limited energy supply. This again requires the security design to be efficient regarding
both communication and computation overheads. In most cases, sensors only have very limited
memory spaces, which further narrows down the security design choices. All these resource
constraints require that the security design can only be efficient and lightweight; otherwise it
will not be practical for WSNs.
B. Network Constraints
WSNs use wireless open channel, therefore an adversary can easily eavesdrop all the network
communications, as well as arbitrarily injecting messages and launching jamming attacks at
different network layers. This means that the security design has to take into account both
passive and active attacks. WSNs are distributed in nature, therefore centralized security
solutions cannot be an option for WSNs. This also means that WSNs are vulnerable to various
DoS attacks. WSNs are often very large in scale, which in turn imposes scalability requirement
on the security design.
C. Malicious Attacks
Give the large scale of the WSNs, it is impractical to protect or monitor each individual sensor
node physically. In addition, sensors are also not tampering resistant. Therefore, the adversary
may capture and compromise a certain number of sensor nodes without being noticed and
obtain all the secrets stored on these sensors. The adversary is thus able to launch a variety of
malicious insider attacks against the network through these compromised nodes in addition to
outsider attacks. For example, the compromised nodes may report bogus observations in order
to mislead the network owner or users; they may also discard important messages such as data
reports in order to hide some critical events from being noticed. All these attacks could cause
severe results that may disable network functionality at least temporarily. Hence, it is highly
important for the security design to be robust against sensor compromise and against both
outsider and insider attacks.
Despite the importance, providing satisfactory security protection in WSNs has never been
an easy task. This is because sensor networks not only suffer from various malicious attacks;
but also, are subject to many resource and network constraints as compared to traditional
wireless networks. This motivates the research data security for WSNs.
3. DATA SECURITY
One of the most severe security threats in WSNs is security compromise of sensor nodes due
to their lack of tamper resistance. In WSNs, the attacker could compromise multiple nodes to
obtain their carried keying materials and control them, and thus is able to intercept data
transmitted through these nodes thereafter. As the number of compromised nodes grows,
communication links between uncompromised nodes might also be compromised through
malicious cryptanalysis. Hence, this type of attacks could lead to severe data confidentiality
compromise in WSNs. Furthermore, the attacker may use compromised nodes to inject bogus
data traffic in WSNs. In such attacks, compromised nodes pretend to have detected an event of
interest within their vicinity, or simply fabricate a bogus event report claiming a non-existing
event at an arbitrary location. Such insider attacks can severely damage network function and
result in the failure of mission-critical applications. Such attacks also induce network
congestion and wireless contention and waste the scarce network resources such as energy and
bandwidth, hence, severely affecting both data authenticity and availability. Lastly, the attacker
could also use compromised nodes to launch selective forwarding attack, in which case
compromised nodes selectively drop the going-through data traffic and thus data availability
An Advanced Data Security Method in Wsn
http://www.iaeme.com/IJARET/index.asp 266 editor@iaeme.com
can be severely damaged. The existence of aforementioned attacks, together with the inherent
constraints of sensor nodes, makes it rather challenging to provide satisfying data security in
WSNs with respect to all its three aspects, i.e., confidentiality, authenticity and availability.
Recent research has seen a growing body of work on security designs for WSNs [2], [3], [4],
[6], [7], [8], [10]. Due to the resource constraint, most of the proposals are based on
symmetric cryptography and only provide data authenticity and/or confidentiality in a hop-by-
hop manner. End-to-end encryption/ authentication is considered less feasible, particular in a
WSN consisting of a large number of nodes. However, lack of the end-to-end security
guarantee could make WSNs particularly vulnerable to the aforementioned attacks in many
applications, where nodeto-sink communication is the dominant communication pattern. This
could give the attacker the advantage to obtain/manipulate its desired data at a much less
effort without having to compromise a large number of nodes. To make things worse, existing
security designs are highly vulnerable to many types of DoS attacks, such as report disruption
attacks and selective forwarding attacks.
Figure 2 Node injects false report in various locations and that false report cause false alarms. In
delivering false reports energy and bandwidth could be wasted. The user may also miss a real event.
A. Data Security Requirements In WSN
Data should be accessible only to authorized entities (usually the sink in WSNs). It should be
genuine and should be always available upon request to the authorized entities. More specially,
the below three requirements can be further elaborated in WSNs as follows:
Data Confidentiality
Confidentiality is required in sensors environment to protect information traveling among the
sensor nodes of the network or between the sensors and the base station from disclosure.
Confidentiality is an assurance of authorized access to information. In the context of
networking, confidentiality means that the information about communications should be kept
in secret from anyone without authorized access permission. In WSNs, data of interest, which
may vary depending on different applications and usually appears as event reports sent by the
sensing nodes from event happening area via multichip paths to the sink.
Data Authenticity
Authenticity is an assurance of the identities of communicating nodes. Every node needs to
know that a received packet comes from a real sender. Otherwise, the receiving node can be
cheated into performing some wrong actions. Authentication in sensor networks is essential for
each sensor node and base station to have the ability to verify that the data received was really
sent by trusted sender or not. Data reports collected by WSNs are usually sensitive and even
critical, such as in military applications. Hence, it is important to assure data authenticity in
addition to confidentiality.
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Dr. Anita Sheela
http://www.iaeme.com/IJARET/index.asp 267 editor@iaeme.com
Data Availability
Availability is an assurance of the ability to provide expected services as they are designed in
advance. It is a very comprehensive concept in the sense that it is related to almost every aspect
of a network. Any problem in a network can result in the degradation of the network
functionality and thus compromise the network availability, leading to the DoS. As
compromised nodes are assumed to be existing in WSNs, it is important to prevent or be tolerant
to their interference as much as possible to protect data availability.
B. Security Threats In WSN
•In WSNs, the attacker could compromise multiple nodes to obtain their carried keying
materials and control them. This type of attack could lead to severe data confidentiality
compromise in WSNs.
•The attacker may use compromised nodes to inject bogus data traffic in WSNs. This type
of attack could lead to severe both data authenticity and availability.
•Lastly, the attacker could also use compromised nodes to launch a selective forwarding
attack, in which case compromised nodes selectively drop the going-through data traffic and,
thus, data availability can be severely damaged.
4. RELATED WORK
Wireless sensor network is used in a wide range of environments. They are vulnerable to more
attacks than the conventional networks, due to the various inherent characteristics of wireless
communication. Most critical is to achieve authentication and data confidentiality. Some of the
papers reviewed to get an idea of the different systems existing in WSN are as follows:
An interleaved hop-by-hop authentication scheme for filtering of injected false
data in sensor networks, 2004
S. Zhu, S. Setia, S. Jajodia, and P. Ning [3] proposed a scheme called interleaved hop-by-
hop authentication (IHA) and is one of the first works in data authentication for wireless sensor
networks. In this scheme, the sensor nodes are organized into clusters. The collaboration of a
minimum number of nodes inside a cluster is generated a appropriate report. Every cluster has
a representative that is called the cluster head (CH). The CH is responsible for collecting enough
number of message authentication code (MAC) values generated by the collaborating nodes,
generating a report, and forwarding it to the sink. The forwarding path from every node to the
sink is discovered at the initialization phase. The authenticity of the report is verified at every
hop of the forwarding path to the sink by the aid of the MAC values. For this purpose,
authentication chains are discovered, and authentication keys are established both at the
initialization phase of the network operation. A report with even one unverified MAC is
regarded as bogus and dropped enroute. Therefore, a malicious node injecting noise to the
network always causes these messages to be dropped. The other drawback of IHA is the
association maintenance that introduces high communication overhead.
Statistical en-route filtering of injected false data in sensor networks, 2005
F. Ye, H. Luo, S. Lu, and L. Zhang [4] have proposed a Statistical En-route Filtering (SEF)
mechanism that is very similar to IHA. The main difference is that associated nodes are not
manually determined at the initialization phase. In contrast to IHA, the associated nodes are
discovered by a probabilistic approach. In SEF, every node is pre-distributed with the keying
material that are used to establish the authentication keys after the network deployment. The
key pre-distribution parameters are selected to guarantee, with a high probability, that any CH
is able to establish many authentication keys. The SEF provides data availability similar to
An Advanced Data Security Method in Wsn
http://www.iaeme.com/IJARET/index.asp 268 editor@iaeme.com
IHA. Because of the probabilistic nature of SEF, every node is required to store many keys to
guarantee the existence of a minimum number of authentication keys. Therefore, two other
drawbacks of SEF are the requirement forlarge storage memory and the possibility of
revealing many authentication keys by compromising only a few nodes.
Toward resilient security in wireless sensor networks, 2005
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh[6] employed to achieve graceful
performance degradation to an increasing number of compromised keys, the locationbinding
keys and location-based key assignment than both previous schemes (IHA and SEF) have a
threshold property, i.e., an adversary has to compromise a minimum number of authentication
keys to forge a report. The proposed scheme, called location-based resilient security (LBRS),
is conceptually very similar to the SEF. However, the data is forwarded toward the sink in a
hop-by-hop fashion. Thus, LBRS localizes the adversarial activities to only the area of the
network which is under attack. The LBRS inherits the disadvantages of the SEF except the
performance degradation behavior.
Existing security designs provide a hop-by-hop security paradigm only, which leaves the
end-to-end data security at high stake. Data confidentiality and authenticity is highly vulnerable
to insider attacks, and the multihop transmission of messages aggravates the situation.
Moreover, data availability is not sufficiently addressed in existing security designs, many of
which are highly vulnerable to many types of Denial of Service (DoS) attacks.
5. END-TO END VERSUS HOP-BY-HOP DESIGN
Recent research has seen a growing body of work on security designs for WSNs [3], [4], [6],
[8], [9]. Due to the resource constraint, most of the proposals are based on symmetric
cryptography and only provide data authenticity and/or confidentiality in a hop-by-hop manner.
End-to-end encryption/ authentication is considered less feasible, particularly in a WSN
consisting of a large number of nodes. However, lack of the end-to-end security guarantee could
make WSNs particularly vulnerable to the aforementioned attacks in many applications where
node-to-sink communication is the dominant communication pattern. This could give the
attacker the advantage to obtain/ manipulate its desired data using much less effort without
having to compromise a large number of nodes. To make things worse, existing security designs
are highly vulnerable to many types of Denial of Service (DoS) attacks such as report disruption
attacks and selective forwarding attacks.
In the past few years, many secret key predistribution schemes have been proposed [2], [8],
[9], [10]. By leveraging preloaded keying materials on each sensor node, these schemes Two
types of node compromise are considered: random node capture and selective node capture,
according to key distribution. Hop-by-hop security design works fine when assuming a uniform
wireless communication pattern in WSNs. However, in many applications’ node-to-sink
communication is the dominant communication pattern in WSNs, that is, data of interest are
usually generated from the event happening area and transmitted all the way to the sink. In this
case, hop-by-hop security design is not sufficient any more as it is vulnerable to communication
pattern-oriented node capture attacks. Data confidentiality can be easily compromised due to
lack of end-to-end security guarantee, since compromising any intermediate node will lead to
exposure of the transmitted data. At the meantime, as the attacker could decrypt the intercepted
data, it could therefore, freely manipulate them to deceive the sink and hence, severely affects
data availability. The lack of end-to-end security association also makes it hard, if not
impossible at all, to enforce data authenticity. We therefore conclude that end-to-end security
design is much more desirable for WSNs as compared to hop-by-hop design when node-to-sink
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Dr. Anita Sheela
http://www.iaeme.com/IJARET/index.asp 269 editor@iaeme.com
communication is the dominant communication pattern as it can offer a much higher security
resilience.
6. PROBLEM STATEMENT
A. System Model Wireless sensor nodes may be deployed into some target field to detect the
events occurring within the field. For example, in a military application, they may be deployed
to a battlefield to detect the activities of enemy forces. We assume that sensor nodes form a
number of clusters after deployment, each containing at least n nodes. In each cluster, one node
is randomly selected as the cluster head. To balance energy consumption, all nodes within a
cluster take turns to serve as the cluster-head. That means physically there is no difference
between a cluster-head and a normal node because the cluster-head performs the same sensing
job as the normal node.
Fig.3.illustrates the organization of sensing nodes in wireless sensor networks. In the figure CH
and BS denote Cluster-Head and Base Station respectively. u1~u5 are forwarding are
forwarding nodes, and v1~v8 are sensing nodes (they can also serve as the forwarding nodes
for other clusters). The black dots represent the compromised nodes, which are located either
in the clusters or en-route.
Figure 3 Sensor nodes are organized into clusters. The big dashed circles outline the regions of
clusters.
7. SIMULATION AND RESULTS
Figure 4 Randomly distributed nodes.
An Advanced Data Security Method in Wsn
http://www.iaeme.com/IJARET/index.asp 270 editor@iaeme.com
Figure 5 The network lifetime
REFERENCES
[1] H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, pp. 103-105,
Oct. 2003.
[2] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor
Networks,” Proc.IEEE Symposium Research inSecurity and Privacy”,May 2003.
[3] S. Zhu, S.Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-By-Hop Authentication
Scheme for Filteringof Injected False Data in Sensor Networks”.Proc. IEEE Symp. Security
and Privacy, May 2004.
[4] F. Ye, H. Luo, S. Lu, and L. Zhang, “Stastical En-Route
[5] Filtering of Injected False Data in Sensor Networks,” In IEEE INFOCOM’04, Hong Kong,
China, Mar. 2004.
[6] A. Wood and J. Stankovic, “Denial of service in sensor networks”, IEEE Computer
Magazine, vol. 35, no. 10, Oct. 2002
[7] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless
Sensor Networks,” in Proc. ACM Int. Symp. Mobile Ad Hoc Net. Comput-MobiHoc, 2005.
[8] W. Du, J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Predistribution Scheme for
Wireless Sensor Networks,” ACM Trans. Information and System
[9] Security, vol. 8, no. 2, pp. 228-258, May 2005.
[10] W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A Key Management Scheme for
Wireless SensorNetworks
[11] Using Deployment Knowledge,” IEEE Trans.Dependable and Secure computing, vol. 3,
no. 2, pp. 62-77, Jan-Mar. 2006.
[12] S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing Pair-Wise Keys for Secure
Communication in Ad
[13] HocNetworks: A Probabilistic Approach,” Proc. IEEE Int’l Conf.Network Protocols
(ICNP’03), Nov. 2003.
[14] L. Eschenauer and V. Gligor, “A Key-Management Scheme for Distributed Sensor
Networks”, In ACM CCS, Washington, DC, Nov. 2002.

More Related Content

What's hot

A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSIAEME Publication
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNIJERA Editor
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...csandit
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...cscpconf
 
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 

What's hot (16)

331 340
331 340331 340
331 340
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSN
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
 
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 

Similar to AN ADVANCED DATA SECURITY METHOD IN WSN

Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)IAESIJEECS
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSIAEME Publication
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.AIRCC Publishing Corporation
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wirelessIJCNCJournal
 
first_ppt[1] (1).pptx
first_ppt[1] (1).pptxfirst_ppt[1] (1).pptx
first_ppt[1] (1).pptxRITHESHKT1
 

Similar to AN ADVANCED DATA SECURITY METHOD IN WSN (19)

Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wireless
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
first_ppt[1] (1).pptx
first_ppt[1] (1).pptxfirst_ppt[1] (1).pptx
first_ppt[1] (1).pptx
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Recently uploaded (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

AN ADVANCED DATA SECURITY METHOD IN WSN

  • 1. http://www.iaeme.com/IJARET/index.asp 263 editor@iaeme.com International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 10, Issue 2, March-April 2019, pp. 263-270. Article ID: IJARET_10_02_026 Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 © IAEME Publication AN ADVANCED DATA SECURITY METHOD IN WSN Syeda Kausar Fatima, Research Scholar Jntuh, Prof., Dcet, Hyderabad, Principal Nsakcet, Prof., Ece Dept. Jntuh, India. Dr. Syeda Gauhar Fatima, Research Scholar Jntuh, Prof., Dcet, Hyderabad, Principal Nsakcet, Prof., Ece Dept. Jntuh, India. Dr. Syed Abdul Sattar Research Scholar Jntuh, Prof., Dcet, Hyderabad, Principal Nsakcet, Prof., Ece Dept. Jntuh, India. Dr. Anita Sheela Research Scholar Jntuh, Prof., Dcet, Hyderabad, Principal Nsakcet, Prof., Ece Dept. Jntuh, India. ABSTRACT Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security. Keywords-Data security, end-to-end, DoS attack, wireless sensor network Cite this Article: Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar, And Dr. Anita Sheela, An Advanced Data Security Method in Wsn, International Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 263- 270. http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
  • 2. An Advanced Data Security Method in Wsn http://www.iaeme.com/IJARET/index.asp 264 editor@iaeme.com 1. INTRODUCTION A wireless sensor network (WSN) is a wireless network comprising of a large number of spatially distributed sensor nodes. These sensor nodes can be easily established at planned regions at a low cost. Provided with various types of sensors, sensor nodes cooperate with each other to monitor physical or environmental conditions, such as temperature, vibration, sound, image, pressure, motion or pollutants. Each sensor node is equipped with a radio transceiver or other wireless communication device, a microprocessor, and an energy source (e.g., a battery). However, providing satisfactory security protection in WSNs has ever been a challenging task due to various network & resource constraints and malicious attacks. The sensor nodes and the base stations are the major elements of WSN. These both can be abstracted as the ‘sensing cells’ and the ‘brain’ of the network, respectively. Security compromise of sensor nodes is one of the most severe security threats in WSNs due to their lack of tamper resistance [1]. In WSNs, the attacker could compromise multiple nodes to obtain their carried keying material and control them and thus is able to intercept data transmitted through these nodes thereafter. As the number of compromised nodes grows, communication links between uncompromised nodes might also be compromised through malicious cryptanalysis. Thus, this type of attack could lead to severe data confidentiality compromise in WSNs. Furthermore, the attacker may use compromised nodes to inject bogus data traffic in WSNs. 2. WIRELESS SENSOR NETWORK Wireless sensor networks composed of a large number of sensor nodes. Sensor nodes are typically small, low cost, low power devices. Sensor nodes perform the functionality such as sense/monitor its local environment, perform limited data processing, and communicate on short distance. A WSN usually also contains a “sink” node(s) which collects data from sensor nodes and connects the WSN to the outside world. Wireless sensor networks (WSNs) are rapidly growing in their importance and relevance to both the research community and the public at large. A distributed wireless sensor network is formed by a large number of tiny and inexpensive sensor nodes. These nodes are typically resource constrained, with limited energy lifetime, low-power micro sensors and actuators, slow embedded processors, limited memory, and low bandwidth radios. Figure 1 Sensor network architecture. The following unique features of WSNs make it particularly challenging to protect communication security in WSNs. A. Resource Constraints Small sensors only have limited communication and computation capabilities, which makes it difficult to implement expensive security operations for WSNs. This precludes the direct transplantation of the existing security designs aimed for traditional wireless networks, where
  • 3. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Dr. Anita Sheela http://www.iaeme.com/IJARET/index.asp 265 editor@iaeme.com network nodes are much more powerful devices. Sensor nodes are battery-powered, having only limited energy supply. This again requires the security design to be efficient regarding both communication and computation overheads. In most cases, sensors only have very limited memory spaces, which further narrows down the security design choices. All these resource constraints require that the security design can only be efficient and lightweight; otherwise it will not be practical for WSNs. B. Network Constraints WSNs use wireless open channel, therefore an adversary can easily eavesdrop all the network communications, as well as arbitrarily injecting messages and launching jamming attacks at different network layers. This means that the security design has to take into account both passive and active attacks. WSNs are distributed in nature, therefore centralized security solutions cannot be an option for WSNs. This also means that WSNs are vulnerable to various DoS attacks. WSNs are often very large in scale, which in turn imposes scalability requirement on the security design. C. Malicious Attacks Give the large scale of the WSNs, it is impractical to protect or monitor each individual sensor node physically. In addition, sensors are also not tampering resistant. Therefore, the adversary may capture and compromise a certain number of sensor nodes without being noticed and obtain all the secrets stored on these sensors. The adversary is thus able to launch a variety of malicious insider attacks against the network through these compromised nodes in addition to outsider attacks. For example, the compromised nodes may report bogus observations in order to mislead the network owner or users; they may also discard important messages such as data reports in order to hide some critical events from being noticed. All these attacks could cause severe results that may disable network functionality at least temporarily. Hence, it is highly important for the security design to be robust against sensor compromise and against both outsider and insider attacks. Despite the importance, providing satisfactory security protection in WSNs has never been an easy task. This is because sensor networks not only suffer from various malicious attacks; but also, are subject to many resource and network constraints as compared to traditional wireless networks. This motivates the research data security for WSNs. 3. DATA SECURITY One of the most severe security threats in WSNs is security compromise of sensor nodes due to their lack of tamper resistance. In WSNs, the attacker could compromise multiple nodes to obtain their carried keying materials and control them, and thus is able to intercept data transmitted through these nodes thereafter. As the number of compromised nodes grows, communication links between uncompromised nodes might also be compromised through malicious cryptanalysis. Hence, this type of attacks could lead to severe data confidentiality compromise in WSNs. Furthermore, the attacker may use compromised nodes to inject bogus data traffic in WSNs. In such attacks, compromised nodes pretend to have detected an event of interest within their vicinity, or simply fabricate a bogus event report claiming a non-existing event at an arbitrary location. Such insider attacks can severely damage network function and result in the failure of mission-critical applications. Such attacks also induce network congestion and wireless contention and waste the scarce network resources such as energy and bandwidth, hence, severely affecting both data authenticity and availability. Lastly, the attacker could also use compromised nodes to launch selective forwarding attack, in which case compromised nodes selectively drop the going-through data traffic and thus data availability
  • 4. An Advanced Data Security Method in Wsn http://www.iaeme.com/IJARET/index.asp 266 editor@iaeme.com can be severely damaged. The existence of aforementioned attacks, together with the inherent constraints of sensor nodes, makes it rather challenging to provide satisfying data security in WSNs with respect to all its three aspects, i.e., confidentiality, authenticity and availability. Recent research has seen a growing body of work on security designs for WSNs [2], [3], [4], [6], [7], [8], [10]. Due to the resource constraint, most of the proposals are based on symmetric cryptography and only provide data authenticity and/or confidentiality in a hop-by- hop manner. End-to-end encryption/ authentication is considered less feasible, particular in a WSN consisting of a large number of nodes. However, lack of the end-to-end security guarantee could make WSNs particularly vulnerable to the aforementioned attacks in many applications, where nodeto-sink communication is the dominant communication pattern. This could give the attacker the advantage to obtain/manipulate its desired data at a much less effort without having to compromise a large number of nodes. To make things worse, existing security designs are highly vulnerable to many types of DoS attacks, such as report disruption attacks and selective forwarding attacks. Figure 2 Node injects false report in various locations and that false report cause false alarms. In delivering false reports energy and bandwidth could be wasted. The user may also miss a real event. A. Data Security Requirements In WSN Data should be accessible only to authorized entities (usually the sink in WSNs). It should be genuine and should be always available upon request to the authorized entities. More specially, the below three requirements can be further elaborated in WSNs as follows: Data Confidentiality Confidentiality is required in sensors environment to protect information traveling among the sensor nodes of the network or between the sensors and the base station from disclosure. Confidentiality is an assurance of authorized access to information. In the context of networking, confidentiality means that the information about communications should be kept in secret from anyone without authorized access permission. In WSNs, data of interest, which may vary depending on different applications and usually appears as event reports sent by the sensing nodes from event happening area via multichip paths to the sink. Data Authenticity Authenticity is an assurance of the identities of communicating nodes. Every node needs to know that a received packet comes from a real sender. Otherwise, the receiving node can be cheated into performing some wrong actions. Authentication in sensor networks is essential for each sensor node and base station to have the ability to verify that the data received was really sent by trusted sender or not. Data reports collected by WSNs are usually sensitive and even critical, such as in military applications. Hence, it is important to assure data authenticity in addition to confidentiality.
  • 5. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Dr. Anita Sheela http://www.iaeme.com/IJARET/index.asp 267 editor@iaeme.com Data Availability Availability is an assurance of the ability to provide expected services as they are designed in advance. It is a very comprehensive concept in the sense that it is related to almost every aspect of a network. Any problem in a network can result in the degradation of the network functionality and thus compromise the network availability, leading to the DoS. As compromised nodes are assumed to be existing in WSNs, it is important to prevent or be tolerant to their interference as much as possible to protect data availability. B. Security Threats In WSN •In WSNs, the attacker could compromise multiple nodes to obtain their carried keying materials and control them. This type of attack could lead to severe data confidentiality compromise in WSNs. •The attacker may use compromised nodes to inject bogus data traffic in WSNs. This type of attack could lead to severe both data authenticity and availability. •Lastly, the attacker could also use compromised nodes to launch a selective forwarding attack, in which case compromised nodes selectively drop the going-through data traffic and, thus, data availability can be severely damaged. 4. RELATED WORK Wireless sensor network is used in a wide range of environments. They are vulnerable to more attacks than the conventional networks, due to the various inherent characteristics of wireless communication. Most critical is to achieve authentication and data confidentiality. Some of the papers reviewed to get an idea of the different systems existing in WSN are as follows: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, 2004 S. Zhu, S. Setia, S. Jajodia, and P. Ning [3] proposed a scheme called interleaved hop-by- hop authentication (IHA) and is one of the first works in data authentication for wireless sensor networks. In this scheme, the sensor nodes are organized into clusters. The collaboration of a minimum number of nodes inside a cluster is generated a appropriate report. Every cluster has a representative that is called the cluster head (CH). The CH is responsible for collecting enough number of message authentication code (MAC) values generated by the collaborating nodes, generating a report, and forwarding it to the sink. The forwarding path from every node to the sink is discovered at the initialization phase. The authenticity of the report is verified at every hop of the forwarding path to the sink by the aid of the MAC values. For this purpose, authentication chains are discovered, and authentication keys are established both at the initialization phase of the network operation. A report with even one unverified MAC is regarded as bogus and dropped enroute. Therefore, a malicious node injecting noise to the network always causes these messages to be dropped. The other drawback of IHA is the association maintenance that introduces high communication overhead. Statistical en-route filtering of injected false data in sensor networks, 2005 F. Ye, H. Luo, S. Lu, and L. Zhang [4] have proposed a Statistical En-route Filtering (SEF) mechanism that is very similar to IHA. The main difference is that associated nodes are not manually determined at the initialization phase. In contrast to IHA, the associated nodes are discovered by a probabilistic approach. In SEF, every node is pre-distributed with the keying material that are used to establish the authentication keys after the network deployment. The key pre-distribution parameters are selected to guarantee, with a high probability, that any CH is able to establish many authentication keys. The SEF provides data availability similar to
  • 6. An Advanced Data Security Method in Wsn http://www.iaeme.com/IJARET/index.asp 268 editor@iaeme.com IHA. Because of the probabilistic nature of SEF, every node is required to store many keys to guarantee the existence of a minimum number of authentication keys. Therefore, two other drawbacks of SEF are the requirement forlarge storage memory and the possibility of revealing many authentication keys by compromising only a few nodes. Toward resilient security in wireless sensor networks, 2005 H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh[6] employed to achieve graceful performance degradation to an increasing number of compromised keys, the locationbinding keys and location-based key assignment than both previous schemes (IHA and SEF) have a threshold property, i.e., an adversary has to compromise a minimum number of authentication keys to forge a report. The proposed scheme, called location-based resilient security (LBRS), is conceptually very similar to the SEF. However, the data is forwarded toward the sink in a hop-by-hop fashion. Thus, LBRS localizes the adversarial activities to only the area of the network which is under attack. The LBRS inherits the disadvantages of the SEF except the performance degradation behavior. Existing security designs provide a hop-by-hop security paradigm only, which leaves the end-to-end data security at high stake. Data confidentiality and authenticity is highly vulnerable to insider attacks, and the multihop transmission of messages aggravates the situation. Moreover, data availability is not sufficiently addressed in existing security designs, many of which are highly vulnerable to many types of Denial of Service (DoS) attacks. 5. END-TO END VERSUS HOP-BY-HOP DESIGN Recent research has seen a growing body of work on security designs for WSNs [3], [4], [6], [8], [9]. Due to the resource constraint, most of the proposals are based on symmetric cryptography and only provide data authenticity and/or confidentiality in a hop-by-hop manner. End-to-end encryption/ authentication is considered less feasible, particularly in a WSN consisting of a large number of nodes. However, lack of the end-to-end security guarantee could make WSNs particularly vulnerable to the aforementioned attacks in many applications where node-to-sink communication is the dominant communication pattern. This could give the attacker the advantage to obtain/ manipulate its desired data using much less effort without having to compromise a large number of nodes. To make things worse, existing security designs are highly vulnerable to many types of Denial of Service (DoS) attacks such as report disruption attacks and selective forwarding attacks. In the past few years, many secret key predistribution schemes have been proposed [2], [8], [9], [10]. By leveraging preloaded keying materials on each sensor node, these schemes Two types of node compromise are considered: random node capture and selective node capture, according to key distribution. Hop-by-hop security design works fine when assuming a uniform wireless communication pattern in WSNs. However, in many applications’ node-to-sink communication is the dominant communication pattern in WSNs, that is, data of interest are usually generated from the event happening area and transmitted all the way to the sink. In this case, hop-by-hop security design is not sufficient any more as it is vulnerable to communication pattern-oriented node capture attacks. Data confidentiality can be easily compromised due to lack of end-to-end security guarantee, since compromising any intermediate node will lead to exposure of the transmitted data. At the meantime, as the attacker could decrypt the intercepted data, it could therefore, freely manipulate them to deceive the sink and hence, severely affects data availability. The lack of end-to-end security association also makes it hard, if not impossible at all, to enforce data authenticity. We therefore conclude that end-to-end security design is much more desirable for WSNs as compared to hop-by-hop design when node-to-sink
  • 7. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Dr. Anita Sheela http://www.iaeme.com/IJARET/index.asp 269 editor@iaeme.com communication is the dominant communication pattern as it can offer a much higher security resilience. 6. PROBLEM STATEMENT A. System Model Wireless sensor nodes may be deployed into some target field to detect the events occurring within the field. For example, in a military application, they may be deployed to a battlefield to detect the activities of enemy forces. We assume that sensor nodes form a number of clusters after deployment, each containing at least n nodes. In each cluster, one node is randomly selected as the cluster head. To balance energy consumption, all nodes within a cluster take turns to serve as the cluster-head. That means physically there is no difference between a cluster-head and a normal node because the cluster-head performs the same sensing job as the normal node. Fig.3.illustrates the organization of sensing nodes in wireless sensor networks. In the figure CH and BS denote Cluster-Head and Base Station respectively. u1~u5 are forwarding are forwarding nodes, and v1~v8 are sensing nodes (they can also serve as the forwarding nodes for other clusters). The black dots represent the compromised nodes, which are located either in the clusters or en-route. Figure 3 Sensor nodes are organized into clusters. The big dashed circles outline the regions of clusters. 7. SIMULATION AND RESULTS Figure 4 Randomly distributed nodes.
  • 8. An Advanced Data Security Method in Wsn http://www.iaeme.com/IJARET/index.asp 270 editor@iaeme.com Figure 5 The network lifetime REFERENCES [1] H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, pp. 103-105, Oct. 2003. [2] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc.IEEE Symposium Research inSecurity and Privacy”,May 2003. [3] S. Zhu, S.Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-By-Hop Authentication Scheme for Filteringof Injected False Data in Sensor Networks”.Proc. IEEE Symp. Security and Privacy, May 2004. [4] F. Ye, H. Luo, S. Lu, and L. Zhang, “Stastical En-Route [5] Filtering of Injected False Data in Sensor Networks,” In IEEE INFOCOM’04, Hong Kong, China, Mar. 2004. [6] A. Wood and J. Stankovic, “Denial of service in sensor networks”, IEEE Computer Magazine, vol. 35, no. 10, Oct. 2002 [7] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” in Proc. ACM Int. Symp. Mobile Ad Hoc Net. Comput-MobiHoc, 2005. [8] W. Du, J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” ACM Trans. Information and System [9] Security, vol. 8, no. 2, pp. 228-258, May 2005. [10] W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A Key Management Scheme for Wireless SensorNetworks [11] Using Deployment Knowledge,” IEEE Trans.Dependable and Secure computing, vol. 3, no. 2, pp. 62-77, Jan-Mar. 2006. [12] S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing Pair-Wise Keys for Secure Communication in Ad [13] HocNetworks: A Probabilistic Approach,” Proc. IEEE Int’l Conf.Network Protocols (ICNP’03), Nov. 2003. [14] L. Eschenauer and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks”, In ACM CCS, Washington, DC, Nov. 2002.