SlideShare a Scribd company logo
1 of 24
1AWU vijayapur5/28/2018 7:09 AM
2
Security Vulnerability and Security
Requirements using Key Management
in Sensor Network
5/28/2018 7:09 AM
AWU vijayapur
3AWU vijayapur
Presented by:
5/28/2018 7:09 AM
4AWU vijayapur
PRESENTATION OBJECTIVES
Security constraint
 Security vulnerability
 Security attacks
 Robust security
 Key management
Public key
 Elliptic Curve Cryptography (ECC)
5/28/2018 7:09 AM
5AWU vijayapur
What is a sensor network?
Consists of spatially distributed sensors
Sensors work cooperatively
Used to monitor or detect phenomena at a
particular location
Sensor node has sensing, data processing
and communication components
Resource constrained, limited battery
5/28/2018 7:09 AM
6AWU vijayapur
Applications of sensor networks
Environmental monitoring – great duck island
Video surveillance
Traffic monitoring
Air traffic control
Robotics
Cars
Home monitoring
Industrial and manufacturing automation.
5/28/2018 7:09 AM
7AWU vijayapur
Constraints in Wireless Sensor
Networks:
The traditional security mechanism of normal computer network may not
directly shift to the sensor network because of the resource constraint nature
of the nodes.
 In order to optimize the conventional security algorithms for WSNs, it is
necessary to be aware about the constraints of sensor nodes.
Communication is more costly than computation in sensor networks.
 Further, higher security levels in sensor networks usually correspond to
more energy consumption for cryptographic functions.
 Thus, Sensor networks could be divided into different security levels
depending on energy cost.
5/28/2018 7:09 AM
8AWU vijayapur5/28/2018 7:09 AM
9AWU vijayapur
Security Vulnerability
The broadcast nature of communication, lack of
infrastructure and hostile environment for the
deployment may lead to vulnerability in sensor
network.
The different attacks are possible in various
constraints based sensor network.
5/28/2018 7:09 AM
10AWU vijayapur
The broadcast nature of communication, infrastructural
constraint, power limitation and hostile environment for the
deployment may lead to adversaries in sensor network.
Types of Adversaries
1. Passive Adversaries
2. active Adversaries
5/28/2018 7:09 AM
11AWU vijayapur
Security Attacks in Sensor Network
Sensor network uses Application layer, Transport layer,
Network layer, Data-link layer and Physical layer for the
communication across the sensor network.
 These layers are having its own functionality and
security requirements. According to the implementation
they provide security. Every layer has its own set of
protocol for unique functionality.
 Different attacks are transpiring at different layer for the
communication.
5/28/2018 7:09 AM
12AWU vijayapur
Application
Layer
Attacks on reality BOOTP, DHCP, DNS,
HTTP, POP3, SSH,
Telnet
Transport Layer Flooding, Inject false
messages (data integrity
attack), Energy drain attacks,
De-synchronization
TCP, UDP, SPX
Network Layer Spoofing, Selective
forwarding or black, holes,
Sinkhole, Sybil attack,
Wormhole,
Acknowledgement spoofing,
HELLO Flooding
RIP, OSPF, EGP, IPX,
IPV6, ARP
Data-Link Layer Collision Frame Relay, FDDI,
Ethernet
Physical Layer Jamming, Tampering SoNet, ISDN, SDH
5/28/2018 7:09 AM
13AWU vijayapur
The number of mechanisms are available to provide robust
security.
In sensor network using asymmetric or symmetric concept
of cryptography.
The algorithm is enriched with various calculations through
which the cipher text becomes unpredictable and breaking
the security by eavesdropper becomes harder.
5/28/2018 7:09 AM
14AWU vijayapur
Security Requirements
Security requirements mainly focus on authentication,
confidentiality and integrity.
 The authentication can achieve through hash or MAC /
HMAC algorithms.
 Confidentiality can achieve through encryption
algorithms.
The encryption algorithms may have symmetric or
asymmetric in nature.
5/28/2018 7:09 AM
15AWU vijayapur
Security Requirements in Wireless
Sensor Networks:
 Availability
 Authentication
 Integrity
 Confidentiality
 Non repudiation
 Data freshness
 Robustness
 Self-Healing
 Time Synchronization
5/28/2018 7:09 AM
16AWU vijayapur
Symmetric key cryptography in
WSNs:
Symmetric key cryptographic mechanisms use a single
shared key between the two communicating host which is used
both for encryption and decryption.
 However, one major challenge for deployment of symmetric
key cryptography is how to securely distribute the shared key
between the two communicating hosts.
 This is a non-trivial problem since pre-distributing the key
may not always be feasible
5/28/2018 7:09 AM
17AWU vijayapur
Asymmetric key cryptography in
WSNs
Use asymmetric keys to perform symmetric
key exchange
Elliptic curve cryptography
Advantages:
 Resilience to node capture
 Compromised keys can be revoked
 Fully scalable
Disadvantages:
 Requires asymmetric key hardware
 Denial of service
 Node replication
5/28/2018 7:09 AM
18AWU vijayapur
 The traditional public key algorithms are not directly
shifted to the sensor network environment.
 They need to be optimized in terms of resource
utilization and computational as well as communicational
overhead.
 The implementations of such resource constraint public
key algorithms are tested over the MICA2 mote using
TinyOS environment.
 The Elliptic Curve Cryptography (ECC) is an ideal
example of public key algorithm implemented in sensor
network environment.
 The RSA algorithm is the competitor of ECC but having
large computation and communication overhead due to it
large key size.
5/28/2018 7:09 AM
19AWU vijayapur5/28/2018 7:09 AM
20AWU vijayapur
Key management protocols
The area that has received maximum attention of the researchers in WSN
security is key management.
Key management is a core mechanism to ensure security in network
services
and applications in WSNs.
The goal of key management is to establish the keys among the
nodes in a secure and reliable manner.
 In addition, the key management scheme must support node addition and
revocation in the network.
Since the nodes in WSNs have computational and power constraints, the
key management protocols for these networks must be extremely light-
weight.
 Most of the existing key management protocols for WSNs are based on
symmetric key cryptography because public key cryptographic techniques
are in general computationally intensive.
5/28/2018 7:09 AM
21AWU vijayapur
Conclusion
In this paper, we demonstrate various constraints in sensor network.
We also specify the vulnerability situation where the various
security attacks are occur at each layer during the communication.
We also demonstrate the security requirement in sensor network
and finally we suggest the public key management scheme using
Elliptic Curve Cryptography to reduce storage space requirement,
reduce communication as well as computational overhead and
provide robust security using elliptic curve operation like point
addition and point multiplications.
5/28/2018 7:09 AM
22AWU vijayapur
References
[1] J. Xu, J. Wang, S. Xie, W. Chen and J. Kim, “Study on Intrusion
Detection Policy for Wireless Sensor Networks”, International Journal of
Security and Its Applications, vol. 7, no. 1, (2013) January, pp. 1-6.
[2] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless
Sensor Networks: a Survey”, Computer Networks, vol. 38, no. 4, (2002), pp.
393-422.
[3] K. Martinez, J. Hart, and R. Ong, “Environmental Sensor Networks”,
IEEE Computer, vol. 37, no. 8, (2004), pp. 50-56
[4] R. Abouhogail, “Security Assessment for Key Management in Mobile Ad
Hoc Networks”, International Journal of Security and Its Applications, vol. 8,
no. 1, (2014), pp. 169-182, http://dx.doi.org/10.14257/ijsia.2014.8.1.16
[5] J. Zhang, J. Tan, and J. Li, “Key Distribution using Double Keyed-hash
Chains for Wireless Sensor Networks”, International Journal of Security and
Its Applications, vol. 7,
5/28/2018 7:09 AM
23AWU vijayapur
[6] E. Ngai, J. Liu, and M. Lyu, “On the Intruder Detection for Sinkhole Attack in
Wireless Sensor Networks”, IEEE International Conference on
Communications, (2006).
[7] D. Martins and H. Guyennet, “Wireless Sensor Network Attacks and Security
Mechanisms: A Short Survey”, 13th International Conference on Network-
Based Information Systems, (2010).
[8] M. Jain, “Wireless Sensor Networks: Security Issues and Challenges”,
International Journal of Computer and Information Technology, vol. 2, no. 1,
(2011), pp. 62-67.
[9] N. Sethi and D. Sharma, “A Novel Method of Image Encryption Using
Logistic Mapping”, International Journal of Computer Science Engineering, vol.
1, no. 2, (2012) November.
[10] S. Karmakar and S. Chandra, “An Approach for Ensuring Security and its
Verification”, International Journal of Computer Science Engineering”, vol. 2, no.
3, (2013) May.
5/28/2018 7:09 AM
24AWU vijayapur5/28/2018 7:09 AM

More Related Content

What's hot

Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeyEditor IJMTER
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networkingsubhradeep mitra
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LeMeniz Infotech
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksVarsha Anandani
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
 
Scalable communication networks - dissertation slides
Scalable communication networks - dissertation slidesScalable communication networks - dissertation slides
Scalable communication networks - dissertation slidesGopika Premsankar
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Raja Shekhar
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...Roshith S Pai
 

What's hot (20)

Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
A0320105
A0320105A0320105
A0320105
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networking
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
 
Scalable communication networks - dissertation slides
Scalable communication networks - dissertation slidesScalable communication networks - dissertation slides
Scalable communication networks - dissertation slides
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
 

Similar to Network security ppt

Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksIRJET Journal
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksIAEME Publication
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...IJECEIAES
 
Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...IJECEIAES
 
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET- Cluster based Routing Protocol for Wireless Sensor NetworkIRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET- Cluster based Routing Protocol for Wireless Sensor NetworkIRJET Journal
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
 
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...IJECEIAES
 

Similar to Network security ppt (20)

Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
 
Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...
 
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET- Cluster based Routing Protocol for Wireless Sensor NetworkIRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
 

Recently uploaded

Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 

Recently uploaded (20)

Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 

Network security ppt

  • 2. 2 Security Vulnerability and Security Requirements using Key Management in Sensor Network 5/28/2018 7:09 AM AWU vijayapur
  • 4. 4AWU vijayapur PRESENTATION OBJECTIVES Security constraint  Security vulnerability  Security attacks  Robust security  Key management Public key  Elliptic Curve Cryptography (ECC) 5/28/2018 7:09 AM
  • 5. 5AWU vijayapur What is a sensor network? Consists of spatially distributed sensors Sensors work cooperatively Used to monitor or detect phenomena at a particular location Sensor node has sensing, data processing and communication components Resource constrained, limited battery 5/28/2018 7:09 AM
  • 6. 6AWU vijayapur Applications of sensor networks Environmental monitoring – great duck island Video surveillance Traffic monitoring Air traffic control Robotics Cars Home monitoring Industrial and manufacturing automation. 5/28/2018 7:09 AM
  • 7. 7AWU vijayapur Constraints in Wireless Sensor Networks: The traditional security mechanism of normal computer network may not directly shift to the sensor network because of the resource constraint nature of the nodes.  In order to optimize the conventional security algorithms for WSNs, it is necessary to be aware about the constraints of sensor nodes. Communication is more costly than computation in sensor networks.  Further, higher security levels in sensor networks usually correspond to more energy consumption for cryptographic functions.  Thus, Sensor networks could be divided into different security levels depending on energy cost. 5/28/2018 7:09 AM
  • 9. 9AWU vijayapur Security Vulnerability The broadcast nature of communication, lack of infrastructure and hostile environment for the deployment may lead to vulnerability in sensor network. The different attacks are possible in various constraints based sensor network. 5/28/2018 7:09 AM
  • 10. 10AWU vijayapur The broadcast nature of communication, infrastructural constraint, power limitation and hostile environment for the deployment may lead to adversaries in sensor network. Types of Adversaries 1. Passive Adversaries 2. active Adversaries 5/28/2018 7:09 AM
  • 11. 11AWU vijayapur Security Attacks in Sensor Network Sensor network uses Application layer, Transport layer, Network layer, Data-link layer and Physical layer for the communication across the sensor network.  These layers are having its own functionality and security requirements. According to the implementation they provide security. Every layer has its own set of protocol for unique functionality.  Different attacks are transpiring at different layer for the communication. 5/28/2018 7:09 AM
  • 12. 12AWU vijayapur Application Layer Attacks on reality BOOTP, DHCP, DNS, HTTP, POP3, SSH, Telnet Transport Layer Flooding, Inject false messages (data integrity attack), Energy drain attacks, De-synchronization TCP, UDP, SPX Network Layer Spoofing, Selective forwarding or black, holes, Sinkhole, Sybil attack, Wormhole, Acknowledgement spoofing, HELLO Flooding RIP, OSPF, EGP, IPX, IPV6, ARP Data-Link Layer Collision Frame Relay, FDDI, Ethernet Physical Layer Jamming, Tampering SoNet, ISDN, SDH 5/28/2018 7:09 AM
  • 13. 13AWU vijayapur The number of mechanisms are available to provide robust security. In sensor network using asymmetric or symmetric concept of cryptography. The algorithm is enriched with various calculations through which the cipher text becomes unpredictable and breaking the security by eavesdropper becomes harder. 5/28/2018 7:09 AM
  • 14. 14AWU vijayapur Security Requirements Security requirements mainly focus on authentication, confidentiality and integrity.  The authentication can achieve through hash or MAC / HMAC algorithms.  Confidentiality can achieve through encryption algorithms. The encryption algorithms may have symmetric or asymmetric in nature. 5/28/2018 7:09 AM
  • 15. 15AWU vijayapur Security Requirements in Wireless Sensor Networks:  Availability  Authentication  Integrity  Confidentiality  Non repudiation  Data freshness  Robustness  Self-Healing  Time Synchronization 5/28/2018 7:09 AM
  • 16. 16AWU vijayapur Symmetric key cryptography in WSNs: Symmetric key cryptographic mechanisms use a single shared key between the two communicating host which is used both for encryption and decryption.  However, one major challenge for deployment of symmetric key cryptography is how to securely distribute the shared key between the two communicating hosts.  This is a non-trivial problem since pre-distributing the key may not always be feasible 5/28/2018 7:09 AM
  • 17. 17AWU vijayapur Asymmetric key cryptography in WSNs Use asymmetric keys to perform symmetric key exchange Elliptic curve cryptography Advantages:  Resilience to node capture  Compromised keys can be revoked  Fully scalable Disadvantages:  Requires asymmetric key hardware  Denial of service  Node replication 5/28/2018 7:09 AM
  • 18. 18AWU vijayapur  The traditional public key algorithms are not directly shifted to the sensor network environment.  They need to be optimized in terms of resource utilization and computational as well as communicational overhead.  The implementations of such resource constraint public key algorithms are tested over the MICA2 mote using TinyOS environment.  The Elliptic Curve Cryptography (ECC) is an ideal example of public key algorithm implemented in sensor network environment.  The RSA algorithm is the competitor of ECC but having large computation and communication overhead due to it large key size. 5/28/2018 7:09 AM
  • 20. 20AWU vijayapur Key management protocols The area that has received maximum attention of the researchers in WSN security is key management. Key management is a core mechanism to ensure security in network services and applications in WSNs. The goal of key management is to establish the keys among the nodes in a secure and reliable manner.  In addition, the key management scheme must support node addition and revocation in the network. Since the nodes in WSNs have computational and power constraints, the key management protocols for these networks must be extremely light- weight.  Most of the existing key management protocols for WSNs are based on symmetric key cryptography because public key cryptographic techniques are in general computationally intensive. 5/28/2018 7:09 AM
  • 21. 21AWU vijayapur Conclusion In this paper, we demonstrate various constraints in sensor network. We also specify the vulnerability situation where the various security attacks are occur at each layer during the communication. We also demonstrate the security requirement in sensor network and finally we suggest the public key management scheme using Elliptic Curve Cryptography to reduce storage space requirement, reduce communication as well as computational overhead and provide robust security using elliptic curve operation like point addition and point multiplications. 5/28/2018 7:09 AM
  • 22. 22AWU vijayapur References [1] J. Xu, J. Wang, S. Xie, W. Chen and J. Kim, “Study on Intrusion Detection Policy for Wireless Sensor Networks”, International Journal of Security and Its Applications, vol. 7, no. 1, (2013) January, pp. 1-6. [2] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless Sensor Networks: a Survey”, Computer Networks, vol. 38, no. 4, (2002), pp. 393-422. [3] K. Martinez, J. Hart, and R. Ong, “Environmental Sensor Networks”, IEEE Computer, vol. 37, no. 8, (2004), pp. 50-56 [4] R. Abouhogail, “Security Assessment for Key Management in Mobile Ad Hoc Networks”, International Journal of Security and Its Applications, vol. 8, no. 1, (2014), pp. 169-182, http://dx.doi.org/10.14257/ijsia.2014.8.1.16 [5] J. Zhang, J. Tan, and J. Li, “Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks”, International Journal of Security and Its Applications, vol. 7, 5/28/2018 7:09 AM
  • 23. 23AWU vijayapur [6] E. Ngai, J. Liu, and M. Lyu, “On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks”, IEEE International Conference on Communications, (2006). [7] D. Martins and H. Guyennet, “Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey”, 13th International Conference on Network- Based Information Systems, (2010). [8] M. Jain, “Wireless Sensor Networks: Security Issues and Challenges”, International Journal of Computer and Information Technology, vol. 2, no. 1, (2011), pp. 62-67. [9] N. Sethi and D. Sharma, “A Novel Method of Image Encryption Using Logistic Mapping”, International Journal of Computer Science Engineering, vol. 1, no. 2, (2012) November. [10] S. Karmakar and S. Chandra, “An Approach for Ensuring Security and its Verification”, International Journal of Computer Science Engineering”, vol. 2, no. 3, (2013) May. 5/28/2018 7:09 AM