SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Informatics and Communication Technology (IJ-ICT)
Vol.8, No.1, April 2019, pp. 13~18
ISSN: 2252-8776, DOI: 10.11591/ijict.v8i1.pp13-18  13
Journal homepage: http://iaescore.com/journals/index.php/IJICT
Security in wireless sensor networks
Bahae Abidi1
, Abdelillah Jilbab2
, Mohamed El Haziti3
1
LRIT Associated Unit with CNRST (URAC 29) Faculty of sciences, Mohammed V University in Rabat, Morocco
2
ENSET, Mohammed V University in Rabat, Morocco
3
Higher School of Technology, Sale, Morocco
Article Info ABSTRACT
Article history:
Received Oct 1, 2018
Revised Dec 10, 2018
Accepted Jan 4, 2019
Even in difficult places to reach, the new networking technique allows the
easy deployment of sensor networks although these wireless sensor networks
confront a lot of constraints. The major constraint is related to the quality of
information sent by the network. The wireless sensor networks use different
methods to achieve data to the base station. Data aggregation is an important
one, used by these wireless sensor networks. But this aggregated data can be
subject to several types of attacks and provides security is necessary to resist
against malicious attacks, secure communication between severely resource
constrained sensor nodes while maintaining the flexibility of the topology
changes. Recently, several secure data aggregation schemes have been
proposed for wireless sensor networks, it provides better security compared
with traditional aggregation. In this paper, we try to focus on giving a brief
statement of the various approaches used for the purpose of secure data
aggregation in wireless sensor networks.
Keywords:
Aggregation
Authentication
Flexibility
Security
Wireless sensor networks
Copyright © 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Bahae Abidi,
LRIT Associated Unit with CNRST (URAC 29) Faculty of sciences,
Mohammed V University in Rabat, Morocco.
Email: bahae.abidi@gmail.com
1. INTRODUCTION
A wireless sensor network (WSN) [1] is a wireless network, built from a few to several hundred or
even thousands of nodes, where each node is connected to one or several sensors which communicate
through a wireless link, as it shows in Figure 1. It consists of sensor nodes that capturing information from an
environment, processing data and transmitting them to the base station or destination. These nodes are
characterized by a low size, a low complexity device with low cost, which communicates through a wireless
link. In addition, wireless sensor networks confront same difficulties, such as limited power supplies, low
bandwidth, small memory sizes and limited energy.
Figure 1. Structure of Wireless Sensor Network
 ISSN: 2252-8776
IJ-ICT Vol. 8, No. 1, April 2019 : 13–18
14
In order to respond to these various constraints, multiple routing protocols were implemented. These
routing protocols have been developed to help nodes to exchange their information, data are routed to reaches
the sink, finding an optimal routing tree to connect sources to sinks, depending on the network organization,
different ways are used according to the routing strategy. There are several methods, techniques, and
algorithms used to fuse data: like clustering, fusion, aggregation. Who have to increase the network lifetime,
all that with maintaining efficiency and quality of information.
Clustering [2] is a self organization of the network nodes into clusters, according to some rules, to
decrease the number of transmitted messages to the base station and thus reduce the size of the routing table
stored at the individual node. Members of a cluster can communicate with their cluster-head (CH) directly
and the CHs can forward data to the base station.
To describe the aspect of the fusion, several different terms have been used like data fusion,
information fusion. The information fusion can be defined as the combination of multiple sources to obtain
improved information with cheaper cost and greater quality. Concerning the term of data aggregation [3], it
becomes popular in wireless sensor networks as a synonym for information fusion. Aggregation is the ability
to summarize, which means that the amount of data is reduced, and the volume of data being manipulated is
reduced also.
Providing a robust data aggregation protocol is a challenge because these aggregated data can be the
subject of several types of attacks. So provides security is required to resist against malicious attacks, while
maintaining a secure communication between various nodes in the network, facing the different constraints
and adapting to the topology changes. Several secure schemes of data aggregation for wireless sensor
networks have been proposed and it provides better security compared with traditional aggregation.
The paper is organized as follows: Section two deals with the use of security mechanism in the
network, in section three we define some different attacks in wireless sensor networks, section four with
giving a brief statement of the various approaches used for secure data aggregation in wireless sensor
networks and finally we conclude in section five.
2. SECURITY IN WSN
To design a low power wireless sensor networks, energy optimization is a critical issue, without
forgetting the use of a secure mechanism to protect our network. The energy consumption may not be
negligible compared to the actual transmit power, to perform the sensing phases, the research will be aimed
at the development of efficient systems able to directly use the antenna. The antenna plays a significant role
in the overall reliability of the network, since it must guarantee the communication despite the difficult
environment in which it has to operate [4-6], also the choice of the antennas to be exploited for the wireless
sensor network realization can save our network from the different attacks, because the security becomes
critical in wireless sensor networks in view of a large number of nodes. The security requirement for wireless
sensor networks are similar to the others networks, a multi-hop communication is preferred, and the data can
be sent by any node depending on the topology of the network.
2.1. Authentication
The authentication is a measure of security [7], each member of the network is authenticated before
revealing information, it’s a fundamental mechanism for access control in the network. Generally, the
authentication is the process of verifying the identity of someone or something. If the authentication failed,
an attacker can join the network and inject the wrong data. We have three types of cryptographic functions
used for authentication: the hash function, secret key function, and public key function. But the traditional
authentication based on public key cryptography is not suitable for wireless sensor networks, due to limited
bandwidth and communication being most expensive in terms of energy. The message should not be
extended significantly in length when we apply the security service. For that, in wireless sensor networks, we
use two types of authentication: the device level authentication means a message is proved to originate from
a specific device, and the group level authentication message is proved from a group of devices.
2.2. Confidentiality
The confidentiality is the property that information is not made available to unauthorized processes
[8]. It provides privacy in the network, all information should be kept secret, that’s mean, we have to encrypt
the data with a secret key.
2.3. Freshness
The freshness is an important measure required by the sensor because this service makes certain that
the transferred data on the network are recent. How is that done? It’s simple, the major concept is to maintain
IJ-ICT ISSN: 2252-8776 
Security in wireless sensor networks (Bahae Abidi)
15
a table which contains the last value received from every sender, that’s mean, we have to include an
increasing counter with every message and reject message with old values.
2.4. Availability
For this concept, in wireless sensor networks, it means, that our network must face the various
constraints related to the topology with the limited resources, and be available to provide services and
authorize the communication.
2.5. Integrity
For example, a malicious node may add some manipulated data within a packet. This new packet
can then be sent to the original receiver. So the integrity, ensuring that the message being transferred is never
modified by any adversary without being detected.
3. ATTACKS IN WIRELESS SENSOR NETWORKS
Sensor networks are particularly suitable to several types of attacks, each one with her own goals. In
this section, we will present some famous attacks in wireless sensor networks.
3.1. Sybil attack
Are major routing attacks and a harmful threat to sensor networks, a malicious node try to have
more advantage than the legitime nodes [9], [10]. An adversary can be in more than one place at once, how
that? A malicious node can claim different identities to other nodes in the network which can significantly
reduce the effectiveness of fault tolerant schemes such as distributed storage, dispersity, multipath. Newsome
and al. propose to classify the Sybil attacks in three dimensions:
The first one consist of direct communication to indirect communication:
- Direct: the malicious nodes communicate directly with the legitime one.
- Indirect: the malicious nodes communicate through other malicious nodes proclaiming able to achieve
them.
The second one consist of fabricated identity, stolen identity:
- A Sybil node can create an identity.
- A Sybil node can stol the identity of legitime nodes.
The third one consist of simultaneity:
- The attackers can involve all its identity in the network in a simultaneous way.
- The attacker can present just a parts of its identity over a given time period.
3.2. Wormhole attacks
The wormhole attacks can destabilize or disable wireless sensor networks. The attacker receives the
packets at one point in the network, forwards them through a wireless link with much less latency than the
network links, and relays them to another point in the network. Figure 2 shows an example of a wormhole
attack.
(a) (b)
Figure 2: Wormhole attack
 ISSN: 2252-8776
IJ-ICT Vol. 8, No. 1, April 2019 : 13–18
16
3.3. Denial of Service attacks
The denial of service attack can reduce the wireless sensor networks availability [11]. It is any
occurrence that diminishes or eliminates a network’s capacity, it’s a simple event that prevents the normal
functioning of its services. Denial of service is to prevent the normal operation of sensor victim by sending a
lot of unimportant messages and denying access to other users.
3.4. Physical attacks
The wireless sensor networks are deployed in hostile environments, they are susceptible to many
types of physical attacks due to the unsafe and unprotected communication network. The physical attack is an
unattended operation, one of the most malicious attacks and harmful attacks on wireless sensor networks. All
physical attacks have the ability to deal extra damage, an attacker will aim to recover the key used for
encryption. An attacker can also reprogram the sensor to disrupt the network and the application voluntarily
causing the abnormal behavior of the node.
3.5. Data corruption attacks
Data corruption attack is a type of attack on transit. Data corruption is caused by an attack on data in
the network layer. These types of attacks are among others to create loops or draw him away from the traffic,
generate false errors. How this? The attacker can repeat, delay or modify the content of messages during the
transit.
4. DATA AGGREGATION SECURITY
4.1. Literature Schemes
Ozdemir [12] proposed Secure Reliable Data Aggregation. The authors indicate that the only
cryptography cannot guarantee sufficient security for wireless sensor networks and propose a trusted
network. The major idea is that each sensor node observes the behavior of its neighbors to develop a trust
level. For this, monitoring mechanisms are used to detect the availability of the node and the bad behavior of
neighbors. Secure Reliable Data Aggregation can detect if an aggregator is the subject of a denial of service
attack. The authors claim that this approach involves a charge of tolerable communication while significantly
increasing safety in the aggregation process.
Przydatek and al.[13] proposed a secure data aggregation, this is one of the first solution proposed
by the scientific community. This solution is designed to calculate with the secure manner the aggregation
function. So with that, the user can not only accept data with high probability if the aggregate result is a good
approximation of the actual result, also the user can detect the attack with high probability and reject the
result if it is outside of the limit. The authors proposed the approach ’Aggregate Commit Prove’ in which the
aggregator not only aggregates data but also proves that performs this task correctly. The first step consists of
collecting data from sensor node by the aggregator and then locally computes the corresponding aggregate
data. Concerning the second step, the aggregator is committed to providing a proof ensuring that the
aggregate is well given collected. The server will be verified this evidence. The freshness of data is ensured
with the change of dynamic keys, after each defined time interval. And the authentication with data integrity,
they are ensured by using the message authentication code.
To provide efficiency and confidentiality in wireless sensor networks, Castellucia and al [14]
proposed an efficient aggregation of encrypted data as a solution. They propose an additive homomorphic
encryption while providing security of aggregated data. The main idea is to replace the XOR operation by a
simple modular addition. The proposed system is probabilistic and this feature makes the complicated
cryptanalysis since the sensed measure is covered by the injected random value. However, the source of this
value constitutes the greatest threat against the analysis of encrypted data. It is possible to predict the next
random value, this would mean a total rupture of the system. The security is also ensured against a replay
attack since a new key is associated with each new message.
Yang and al [15] proposed a security protocol for data aggregation, ’Secure hop by hop Data
Aggregation Protocol’. How can the base station get a good approximation of the aggregate in the presence
of some compromises nodes? This approach tries to answer this question. So the authors propose various
solutions in the security of aggregation such as the construction of the key distribution. They are based on the
idea that in a hierarchical approach, nodes located near the base station calculates an aggregate that concerns
large numbers of sensors. The system consists of two phases to avoid making more confidence in this type of
nodes. In the first phase, the system uses a probabilistic approach that divides the network into the same size
groups and a leader is elected in each group. In the second phase, aggregation is performed in each group,
and each group suspected part in a certification process to prove the validity of his aggregate. She starts by
authenticating group leaders, then verifying that the received message authentication code is original from
IJ-ICT ISSN: 2252-8776 
Security in wireless sensor networks (Bahae Abidi)
17
the supposed leader. The base station interacts with the group suspected to prove the validity of his
aggregate.
Boudia and al. [16] proposed encryption data aggregation, this approach had to ensure the essential
security needs with various function. In this one, the base station starts the sensing process by sending a
broadcast message to the sensor nodes which are located in the area of interest. Sensor nodes then report back
with their reading to the base station through an aggregator. The aggregator then processes the received
readings of sensors. The sensor must have the knowledge about aggregation function which is used for the
aggregation of sensor’s reading. Every sensor nodes have their distinct private key shared with the base
station which is computed by taking hash on the master key of the base station with their respective
identifiers. More to this, each sensor node shares a pair-wise key with their children which is used for
encryption.
4.2. Limits of Literature Schemes
Each system according to there specific characteristics have some advantages and disadvantages. In
this paragraph, we will try to discuss the limits of the different schemes that we have mentioned in the
previous paragraph. Concerning the first approach of Ozdemir, it provides high data confidentiality and
authentication, but it’s vulnerable to attacks and this is due to the key size. The second approach of Przydatek
and al. guarantees perfect resilience, because the information is not dispersed on the shared key between two
non compromised nodes. But if a single node is compromised, the security of the whole network is
compromised. The attacker can put many more nodes in a critical situation, in order to damage the
communication links and the amount of memory is extremely limited. The approach of Castellucia and al.
provides high security and this is due to the use of the elliptic curve cryptography but it has limited ability to
protect private key, without forgetting that the integrity is not checked. In Yang and al. approach, The data to
be encrypted is divided into several texts but it’s inefficient because not robust operations are applied in
encryption, which weakens the algorithm and the data security. The advantage of the approach of Boudia and
al. ensured a detection of anomaly nodes but only the final aggregate is verified, so if the verification fails, an
important number of encrypted packets will be lost.
4.3. Security Analysis
In this part of our work, we will compare the different schemes in terms of the security
performances, which means the different attributes that we studied in section 2. There are some schemes
which provide more than one service like the scheme of Boudia and al. with that of Ozdemir which ensure:
Confidentiality, Integrity, Authentication, and Availability. Concerning the scheme of Yang and al., he
provides Confidentiality, Integrity, and Authentication, but that of Castellucia and al. Confidentiality and
Freshness. Finally the scheme of Przydatekand al. ensure both, Integrity and Authentication. We notice that
each solution provides various security services to resist against an attacker; for example the schemes of
Przydatek and al. , Yang and al. are more robust because they can resist to three different attacks from the
attacks in section 3: Denial of Service, Sybil attack, and Physical attacks. Contrary to the scheme of Ozdemir
can resist to just Sybil attack. But that of Boudia and al. with Castellucia and al. can provide security in front
of Denial of Service and Sybil attack.
5. CONCLUSION
Security in wireless sensor networks is the more important things to ensure the routing of data from
the source to the destination, the need for security in WSNs becomes more apparent. Especially in the recent
years, it has attracted a lot of attention because it’s very challenging to design strong security algorithms. In
this paper, we have described some requirement of wireless sensor networks and security problems, we have
also surveyed some proposed schemes for securing data aggregation. Finally, we have discussed the
limitation and security analysis of these schemes.
REFERENCES
[1] Samayveer Singh, A K Chauhan, Sanjeev Raghav, Vikas Tyagi, Sherish Johri, Heterogeneous protocols for
increasing the lifetime of wireless sensor networks, Journal of Global Research in Computer Science, vol.2, no.4,
April(2011), 172-176.
[2] Wesam Almobaideen, Khaled Hushaidan, Azzam Sleit, Mohammad Qatawneh, A Cluster-Based Approach for
Supporting Qos in Mobile AdHoc Networks, International Journal of Digital Content Technology and its
Application, Vol. 5, No. 1, (2011), 1 - 9.
[3] Eduardo F.Nakamura, Alejandro C.Frery, ANTONIO A., Information Fusion for Wireless Sensor Networks:
Methods, Models, and Classifications, ACM Computing Surveys, Vol. 39, No. 3, Article 9, August 2007.
 ISSN: 2252-8776
IJ-ICT Vol. 8, No. 1, April 2019 : 13–18
18
[4] S.K. Jayaweera, "Virtual MIMO-based cooperative communication for energy-constrained wireless sensor
networks," IEEE Transactions on Wireless Communications, vol. 5, n. 5, pp. 984-989, 2006;
[5] P. Rocca and A. F. Morabito, “Optimal synthesis of reconfigurable planar arrays with simplified architectures for
monopulse radar applications,” IEEE Trans. Antennas Propag., vol. 63, n. 3, pp. 1048-1058, 2015.
[6] C. M. Kruesi, R. J. Vyas, and M. M. Tentzeris, "Design and Development of a Novel 3-D Cubic Antenna for
Wireless Sensor Networks (WSNs) and RFID Applications," in: IEEE Transactions on Antennas and Propagation,
vol. 57, n. 10, pp. 3293-3299, 2009.
[7] Shantala Patil, Dr Vijaya Kumar B P, Sonali Singha, Rashique Jamil, A Survey on Authentication Techniques for
Wireless Sensor Networks, International Journal of Applied Engineering Research, Vol. 7, No.11, 2012.
[8] B.Veeramallu, S.Sahitya, Ch.Lavanya Susanna, Confidentiality in Wireless Sensor Networks, International Journal
of Soft Computing and Engineering, Vol.2, Issue-6, January 2013.
[9] Newsome, J., Shi, E., Song, D, and Perrig, A, The Sybil Attack in Sensor Networks: Analysis and Defenses, Proc. of
the third international symposium on Information processing in sensor networks, 2004, 259 - 268.
[10] Douceur, J.The Sybil Attack, 1st International Workshop on Peer-to-Peer Systems 2002.
[11] Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong, Security in Wireless Sensor Networks: Issues and
Challenges, ICACT2006, Feb 2006, 20-22.
[12] S.Ozdemir, H.Ichakawa et al. Secure and Reliable Data Aggregation for Wireless Sensor Networks, (Eds.), LNCS
4836, 2007, 102 – 109.
[13] B.Przydatek, D.X.Song, A.Perrig, Secure Information Aggregation in Sensor Networks, Conference On Embedded
Networked Sensor Systems, 2003, 255 - 265.
[14] C.Castelluccia, E.Mykletun, G.Tsudik, Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,
MobiQuitous, 2005, 109 - 117.
[15] Y.Yang, and al., A Secure Hop-By-Hop Data Aggregation Protocol for Sensor Networks, ACM Transactions on
Information and System Security (TISSEC), 2008.
[16] M.Boudia, O.Rafik, M.Feham, Secure and Efficient Aggregation Scheme for Wireless Sensor Networks using
Stateful Public Key Cryptography, 11th International Symposium on Programming and Systems (ISPS), 2013, 96 -
102.

More Related Content

What's hot

A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyIJCNCJournal
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
 
76201924
7620192476201924
76201924IJRAT
 
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...ijujournal
 
Secured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsSecured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsijujournal
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 

What's hot (18)

A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
 
50120140507012
5012014050701250120140507012
50120140507012
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
76201924
7620192476201924
76201924
 
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
 
Secured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsSecured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcs
 
574 501-507
574 501-507574 501-507
574 501-507
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Jt2416841691
Jt2416841691Jt2416841691
Jt2416841691
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 

Similar to 02 1 nov17 28apr17 6333 17460-1-ed edit iqbal

A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdfVenu Madhav
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to 02 1 nov17 28apr17 6333 17460-1-ed edit iqbal (20)

A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
N010617783
N010617783N010617783
N010617783
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
50120140507012
5012014050701250120140507012
50120140507012
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from IAESIJEECS

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...IAESIJEECS
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...IAESIJEECS
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...IAESIJEECS
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...IAESIJEECS
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...IAESIJEECS
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-IAESIJEECS
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...IAESIJEECS
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...IAESIJEECS
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on applicationIAESIJEECS
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-edIAESIJEECS
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reductionIAESIJEECS
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power lossIAESIJEECS
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reductionIAESIJEECS
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural networkIAESIJEECS
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancementIAESIJEECS
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijictIAESIJEECS
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijictIAESIJEECS
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijictIAESIJEECS
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijictIAESIJEECS
 

More from IAESIJEECS (20)

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on application
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reduction
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power loss
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reduction
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural network
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijict
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijict
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijict
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijict
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

02 1 nov17 28apr17 6333 17460-1-ed edit iqbal

  • 1. International Journal of Informatics and Communication Technology (IJ-ICT) Vol.8, No.1, April 2019, pp. 13~18 ISSN: 2252-8776, DOI: 10.11591/ijict.v8i1.pp13-18  13 Journal homepage: http://iaescore.com/journals/index.php/IJICT Security in wireless sensor networks Bahae Abidi1 , Abdelillah Jilbab2 , Mohamed El Haziti3 1 LRIT Associated Unit with CNRST (URAC 29) Faculty of sciences, Mohammed V University in Rabat, Morocco 2 ENSET, Mohammed V University in Rabat, Morocco 3 Higher School of Technology, Sale, Morocco Article Info ABSTRACT Article history: Received Oct 1, 2018 Revised Dec 10, 2018 Accepted Jan 4, 2019 Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks. Keywords: Aggregation Authentication Flexibility Security Wireless sensor networks Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Bahae Abidi, LRIT Associated Unit with CNRST (URAC 29) Faculty of sciences, Mohammed V University in Rabat, Morocco. Email: bahae.abidi@gmail.com 1. INTRODUCTION A wireless sensor network (WSN) [1] is a wireless network, built from a few to several hundred or even thousands of nodes, where each node is connected to one or several sensors which communicate through a wireless link, as it shows in Figure 1. It consists of sensor nodes that capturing information from an environment, processing data and transmitting them to the base station or destination. These nodes are characterized by a low size, a low complexity device with low cost, which communicates through a wireless link. In addition, wireless sensor networks confront same difficulties, such as limited power supplies, low bandwidth, small memory sizes and limited energy. Figure 1. Structure of Wireless Sensor Network
  • 2.  ISSN: 2252-8776 IJ-ICT Vol. 8, No. 1, April 2019 : 13–18 14 In order to respond to these various constraints, multiple routing protocols were implemented. These routing protocols have been developed to help nodes to exchange their information, data are routed to reaches the sink, finding an optimal routing tree to connect sources to sinks, depending on the network organization, different ways are used according to the routing strategy. There are several methods, techniques, and algorithms used to fuse data: like clustering, fusion, aggregation. Who have to increase the network lifetime, all that with maintaining efficiency and quality of information. Clustering [2] is a self organization of the network nodes into clusters, according to some rules, to decrease the number of transmitted messages to the base station and thus reduce the size of the routing table stored at the individual node. Members of a cluster can communicate with their cluster-head (CH) directly and the CHs can forward data to the base station. To describe the aspect of the fusion, several different terms have been used like data fusion, information fusion. The information fusion can be defined as the combination of multiple sources to obtain improved information with cheaper cost and greater quality. Concerning the term of data aggregation [3], it becomes popular in wireless sensor networks as a synonym for information fusion. Aggregation is the ability to summarize, which means that the amount of data is reduced, and the volume of data being manipulated is reduced also. Providing a robust data aggregation protocol is a challenge because these aggregated data can be the subject of several types of attacks. So provides security is required to resist against malicious attacks, while maintaining a secure communication between various nodes in the network, facing the different constraints and adapting to the topology changes. Several secure schemes of data aggregation for wireless sensor networks have been proposed and it provides better security compared with traditional aggregation. The paper is organized as follows: Section two deals with the use of security mechanism in the network, in section three we define some different attacks in wireless sensor networks, section four with giving a brief statement of the various approaches used for secure data aggregation in wireless sensor networks and finally we conclude in section five. 2. SECURITY IN WSN To design a low power wireless sensor networks, energy optimization is a critical issue, without forgetting the use of a secure mechanism to protect our network. The energy consumption may not be negligible compared to the actual transmit power, to perform the sensing phases, the research will be aimed at the development of efficient systems able to directly use the antenna. The antenna plays a significant role in the overall reliability of the network, since it must guarantee the communication despite the difficult environment in which it has to operate [4-6], also the choice of the antennas to be exploited for the wireless sensor network realization can save our network from the different attacks, because the security becomes critical in wireless sensor networks in view of a large number of nodes. The security requirement for wireless sensor networks are similar to the others networks, a multi-hop communication is preferred, and the data can be sent by any node depending on the topology of the network. 2.1. Authentication The authentication is a measure of security [7], each member of the network is authenticated before revealing information, it’s a fundamental mechanism for access control in the network. Generally, the authentication is the process of verifying the identity of someone or something. If the authentication failed, an attacker can join the network and inject the wrong data. We have three types of cryptographic functions used for authentication: the hash function, secret key function, and public key function. But the traditional authentication based on public key cryptography is not suitable for wireless sensor networks, due to limited bandwidth and communication being most expensive in terms of energy. The message should not be extended significantly in length when we apply the security service. For that, in wireless sensor networks, we use two types of authentication: the device level authentication means a message is proved to originate from a specific device, and the group level authentication message is proved from a group of devices. 2.2. Confidentiality The confidentiality is the property that information is not made available to unauthorized processes [8]. It provides privacy in the network, all information should be kept secret, that’s mean, we have to encrypt the data with a secret key. 2.3. Freshness The freshness is an important measure required by the sensor because this service makes certain that the transferred data on the network are recent. How is that done? It’s simple, the major concept is to maintain
  • 3. IJ-ICT ISSN: 2252-8776  Security in wireless sensor networks (Bahae Abidi) 15 a table which contains the last value received from every sender, that’s mean, we have to include an increasing counter with every message and reject message with old values. 2.4. Availability For this concept, in wireless sensor networks, it means, that our network must face the various constraints related to the topology with the limited resources, and be available to provide services and authorize the communication. 2.5. Integrity For example, a malicious node may add some manipulated data within a packet. This new packet can then be sent to the original receiver. So the integrity, ensuring that the message being transferred is never modified by any adversary without being detected. 3. ATTACKS IN WIRELESS SENSOR NETWORKS Sensor networks are particularly suitable to several types of attacks, each one with her own goals. In this section, we will present some famous attacks in wireless sensor networks. 3.1. Sybil attack Are major routing attacks and a harmful threat to sensor networks, a malicious node try to have more advantage than the legitime nodes [9], [10]. An adversary can be in more than one place at once, how that? A malicious node can claim different identities to other nodes in the network which can significantly reduce the effectiveness of fault tolerant schemes such as distributed storage, dispersity, multipath. Newsome and al. propose to classify the Sybil attacks in three dimensions: The first one consist of direct communication to indirect communication: - Direct: the malicious nodes communicate directly with the legitime one. - Indirect: the malicious nodes communicate through other malicious nodes proclaiming able to achieve them. The second one consist of fabricated identity, stolen identity: - A Sybil node can create an identity. - A Sybil node can stol the identity of legitime nodes. The third one consist of simultaneity: - The attackers can involve all its identity in the network in a simultaneous way. - The attacker can present just a parts of its identity over a given time period. 3.2. Wormhole attacks The wormhole attacks can destabilize or disable wireless sensor networks. The attacker receives the packets at one point in the network, forwards them through a wireless link with much less latency than the network links, and relays them to another point in the network. Figure 2 shows an example of a wormhole attack. (a) (b) Figure 2: Wormhole attack
  • 4.  ISSN: 2252-8776 IJ-ICT Vol. 8, No. 1, April 2019 : 13–18 16 3.3. Denial of Service attacks The denial of service attack can reduce the wireless sensor networks availability [11]. It is any occurrence that diminishes or eliminates a network’s capacity, it’s a simple event that prevents the normal functioning of its services. Denial of service is to prevent the normal operation of sensor victim by sending a lot of unimportant messages and denying access to other users. 3.4. Physical attacks The wireless sensor networks are deployed in hostile environments, they are susceptible to many types of physical attacks due to the unsafe and unprotected communication network. The physical attack is an unattended operation, one of the most malicious attacks and harmful attacks on wireless sensor networks. All physical attacks have the ability to deal extra damage, an attacker will aim to recover the key used for encryption. An attacker can also reprogram the sensor to disrupt the network and the application voluntarily causing the abnormal behavior of the node. 3.5. Data corruption attacks Data corruption attack is a type of attack on transit. Data corruption is caused by an attack on data in the network layer. These types of attacks are among others to create loops or draw him away from the traffic, generate false errors. How this? The attacker can repeat, delay or modify the content of messages during the transit. 4. DATA AGGREGATION SECURITY 4.1. Literature Schemes Ozdemir [12] proposed Secure Reliable Data Aggregation. The authors indicate that the only cryptography cannot guarantee sufficient security for wireless sensor networks and propose a trusted network. The major idea is that each sensor node observes the behavior of its neighbors to develop a trust level. For this, monitoring mechanisms are used to detect the availability of the node and the bad behavior of neighbors. Secure Reliable Data Aggregation can detect if an aggregator is the subject of a denial of service attack. The authors claim that this approach involves a charge of tolerable communication while significantly increasing safety in the aggregation process. Przydatek and al.[13] proposed a secure data aggregation, this is one of the first solution proposed by the scientific community. This solution is designed to calculate with the secure manner the aggregation function. So with that, the user can not only accept data with high probability if the aggregate result is a good approximation of the actual result, also the user can detect the attack with high probability and reject the result if it is outside of the limit. The authors proposed the approach ’Aggregate Commit Prove’ in which the aggregator not only aggregates data but also proves that performs this task correctly. The first step consists of collecting data from sensor node by the aggregator and then locally computes the corresponding aggregate data. Concerning the second step, the aggregator is committed to providing a proof ensuring that the aggregate is well given collected. The server will be verified this evidence. The freshness of data is ensured with the change of dynamic keys, after each defined time interval. And the authentication with data integrity, they are ensured by using the message authentication code. To provide efficiency and confidentiality in wireless sensor networks, Castellucia and al [14] proposed an efficient aggregation of encrypted data as a solution. They propose an additive homomorphic encryption while providing security of aggregated data. The main idea is to replace the XOR operation by a simple modular addition. The proposed system is probabilistic and this feature makes the complicated cryptanalysis since the sensed measure is covered by the injected random value. However, the source of this value constitutes the greatest threat against the analysis of encrypted data. It is possible to predict the next random value, this would mean a total rupture of the system. The security is also ensured against a replay attack since a new key is associated with each new message. Yang and al [15] proposed a security protocol for data aggregation, ’Secure hop by hop Data Aggregation Protocol’. How can the base station get a good approximation of the aggregate in the presence of some compromises nodes? This approach tries to answer this question. So the authors propose various solutions in the security of aggregation such as the construction of the key distribution. They are based on the idea that in a hierarchical approach, nodes located near the base station calculates an aggregate that concerns large numbers of sensors. The system consists of two phases to avoid making more confidence in this type of nodes. In the first phase, the system uses a probabilistic approach that divides the network into the same size groups and a leader is elected in each group. In the second phase, aggregation is performed in each group, and each group suspected part in a certification process to prove the validity of his aggregate. She starts by authenticating group leaders, then verifying that the received message authentication code is original from
  • 5. IJ-ICT ISSN: 2252-8776  Security in wireless sensor networks (Bahae Abidi) 17 the supposed leader. The base station interacts with the group suspected to prove the validity of his aggregate. Boudia and al. [16] proposed encryption data aggregation, this approach had to ensure the essential security needs with various function. In this one, the base station starts the sensing process by sending a broadcast message to the sensor nodes which are located in the area of interest. Sensor nodes then report back with their reading to the base station through an aggregator. The aggregator then processes the received readings of sensors. The sensor must have the knowledge about aggregation function which is used for the aggregation of sensor’s reading. Every sensor nodes have their distinct private key shared with the base station which is computed by taking hash on the master key of the base station with their respective identifiers. More to this, each sensor node shares a pair-wise key with their children which is used for encryption. 4.2. Limits of Literature Schemes Each system according to there specific characteristics have some advantages and disadvantages. In this paragraph, we will try to discuss the limits of the different schemes that we have mentioned in the previous paragraph. Concerning the first approach of Ozdemir, it provides high data confidentiality and authentication, but it’s vulnerable to attacks and this is due to the key size. The second approach of Przydatek and al. guarantees perfect resilience, because the information is not dispersed on the shared key between two non compromised nodes. But if a single node is compromised, the security of the whole network is compromised. The attacker can put many more nodes in a critical situation, in order to damage the communication links and the amount of memory is extremely limited. The approach of Castellucia and al. provides high security and this is due to the use of the elliptic curve cryptography but it has limited ability to protect private key, without forgetting that the integrity is not checked. In Yang and al. approach, The data to be encrypted is divided into several texts but it’s inefficient because not robust operations are applied in encryption, which weakens the algorithm and the data security. The advantage of the approach of Boudia and al. ensured a detection of anomaly nodes but only the final aggregate is verified, so if the verification fails, an important number of encrypted packets will be lost. 4.3. Security Analysis In this part of our work, we will compare the different schemes in terms of the security performances, which means the different attributes that we studied in section 2. There are some schemes which provide more than one service like the scheme of Boudia and al. with that of Ozdemir which ensure: Confidentiality, Integrity, Authentication, and Availability. Concerning the scheme of Yang and al., he provides Confidentiality, Integrity, and Authentication, but that of Castellucia and al. Confidentiality and Freshness. Finally the scheme of Przydatekand al. ensure both, Integrity and Authentication. We notice that each solution provides various security services to resist against an attacker; for example the schemes of Przydatek and al. , Yang and al. are more robust because they can resist to three different attacks from the attacks in section 3: Denial of Service, Sybil attack, and Physical attacks. Contrary to the scheme of Ozdemir can resist to just Sybil attack. But that of Boudia and al. with Castellucia and al. can provide security in front of Denial of Service and Sybil attack. 5. CONCLUSION Security in wireless sensor networks is the more important things to ensure the routing of data from the source to the destination, the need for security in WSNs becomes more apparent. Especially in the recent years, it has attracted a lot of attention because it’s very challenging to design strong security algorithms. In this paper, we have described some requirement of wireless sensor networks and security problems, we have also surveyed some proposed schemes for securing data aggregation. Finally, we have discussed the limitation and security analysis of these schemes. REFERENCES [1] Samayveer Singh, A K Chauhan, Sanjeev Raghav, Vikas Tyagi, Sherish Johri, Heterogeneous protocols for increasing the lifetime of wireless sensor networks, Journal of Global Research in Computer Science, vol.2, no.4, April(2011), 172-176. [2] Wesam Almobaideen, Khaled Hushaidan, Azzam Sleit, Mohammad Qatawneh, A Cluster-Based Approach for Supporting Qos in Mobile AdHoc Networks, International Journal of Digital Content Technology and its Application, Vol. 5, No. 1, (2011), 1 - 9. [3] Eduardo F.Nakamura, Alejandro C.Frery, ANTONIO A., Information Fusion for Wireless Sensor Networks: Methods, Models, and Classifications, ACM Computing Surveys, Vol. 39, No. 3, Article 9, August 2007.
  • 6.  ISSN: 2252-8776 IJ-ICT Vol. 8, No. 1, April 2019 : 13–18 18 [4] S.K. Jayaweera, "Virtual MIMO-based cooperative communication for energy-constrained wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 5, n. 5, pp. 984-989, 2006; [5] P. Rocca and A. F. Morabito, “Optimal synthesis of reconfigurable planar arrays with simplified architectures for monopulse radar applications,” IEEE Trans. Antennas Propag., vol. 63, n. 3, pp. 1048-1058, 2015. [6] C. M. Kruesi, R. J. Vyas, and M. M. Tentzeris, "Design and Development of a Novel 3-D Cubic Antenna for Wireless Sensor Networks (WSNs) and RFID Applications," in: IEEE Transactions on Antennas and Propagation, vol. 57, n. 10, pp. 3293-3299, 2009. [7] Shantala Patil, Dr Vijaya Kumar B P, Sonali Singha, Rashique Jamil, A Survey on Authentication Techniques for Wireless Sensor Networks, International Journal of Applied Engineering Research, Vol. 7, No.11, 2012. [8] B.Veeramallu, S.Sahitya, Ch.Lavanya Susanna, Confidentiality in Wireless Sensor Networks, International Journal of Soft Computing and Engineering, Vol.2, Issue-6, January 2013. [9] Newsome, J., Shi, E., Song, D, and Perrig, A, The Sybil Attack in Sensor Networks: Analysis and Defenses, Proc. of the third international symposium on Information processing in sensor networks, 2004, 259 - 268. [10] Douceur, J.The Sybil Attack, 1st International Workshop on Peer-to-Peer Systems 2002. [11] Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong, Security in Wireless Sensor Networks: Issues and Challenges, ICACT2006, Feb 2006, 20-22. [12] S.Ozdemir, H.Ichakawa et al. Secure and Reliable Data Aggregation for Wireless Sensor Networks, (Eds.), LNCS 4836, 2007, 102 – 109. [13] B.Przydatek, D.X.Song, A.Perrig, Secure Information Aggregation in Sensor Networks, Conference On Embedded Networked Sensor Systems, 2003, 255 - 265. [14] C.Castelluccia, E.Mykletun, G.Tsudik, Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, MobiQuitous, 2005, 109 - 117. [15] Y.Yang, and al., A Secure Hop-By-Hop Data Aggregation Protocol for Sensor Networks, ACM Transactions on Information and System Security (TISSEC), 2008. [16] M.Boudia, O.Rafik, M.Feham, Secure and Efficient Aggregation Scheme for Wireless Sensor Networks using Stateful Public Key Cryptography, 11th International Symposium on Programming and Systems (ISPS), 2013, 96 - 102.