SlideShare a Scribd company logo
1 of 6
Download to read offline
Reliability in WSN for Security: Mathematical
Approach.
George S. Oreku
1,2
1
Tanzania Industrial Reseach and
Development Organization (TIRDO)
P.O Box23235 DSM Tanzania
2
School of Information Technology
North West University - Vaal Triangle
Campus, 1900 South Africa,
P.O.Box1174 vanderbijlpark
+27 762378953
George.oreku@gmail.com
ABSTRACT
Modern wireless sensor networks require specific and high degree
of security due to their limitation and versatility tasks. The
absence of permanent infrastructure makes these networks
suitable for many civilian applications. But their limited
computational ability and battery resources restrictions makes
them vulnerable to many kinds of attacks. This paper presents
reliability in Wireless Sensor Network (WSN) information
transmition, which can be used to exactly estimate the system
working quality. The WSN reliability mathematical calculation
approach presented in this paper gives insight on how to secure
WSN through reliable backbone connectivity, reliable sensor
network and data aggregation. Solutions to meet WSN security
interconnectivity reliability, network reliability and data
aggregation scheme for robust security systems designing also
have been introduced.
Keywords
Networks, WSN Security, WSN, Design, Security, Data
Delivery, Reliability.
1. INTRODUCTION
Sensor networks are being deployed in situations where it
is important to protect the message communication from
eavesdropping or tampering. Wireless Sensor network
(WSN) consists of sensor nodes which are deployed in
versatile and often potentially hostile environment,
responsible for sensing, processing, and transferring
environmental information on the sensor field towards the
sink node that is often referred to as BS (Base Station) as
can be seen on figure one below. The absence of fixed
infrastructure and cost effectiveness makes WSN ideal for
civilian applications such as disaster relief, emergency
rescue operations, patient monitoring, environmental
control, military applications such as target identification
and tracking as well as surveillance networks.
These applications require that sensor networks offer a high
degree of security. An adversary can thwart the work of
any part of the network by perturbing the information
produced,
stopping production, or pilfering information to all what
has been mentioned above as function or application of
WSN.
To reduce the vulnerability paper [1] argues that, the WSN
design must balance traditional objectives such as energy
efficiency, cost, and application level performance with
security to the higher degree than attacker’s competence.
The authors in [2] developed architecture and associated
algorithms to build a self-organizing WSN system that is
capable of detecting mobile targets using cooperative
sensors that are randomly deployed in a physical
environment.
The primary focus presented in manuscript [3] is to
providing security mechanisms that enables the secure
operation of in-network processing, a key emerging theme
in the design and deployment of WSN. Jones et al. in [4]
described a WSN model and proposed a solution which
uses parameterized frequency hopping and cryptographic
keys to provide differential security services and readily
applicable to WSNs having anonymous nodes that are
unaware of location. Perrig et al also proposed SPINS [5], a
general security infrastructure for WSN.
The infrastructure consists of an encryption primitive;
SNEP, and an authenticated streaming broadcast primitive,
micro TESLA have been well discussed in [14]. In [6], an
algorithm to reliably transfer data by using one-phase pull
directed diffusion, a data-centric routing technique in
WSNs have been presented.
However the research in papers [7, 14] presents the ideas
on how to improve and enhance security and performance
of an Ad Hoc networks through a multipath routing
strategy and cipher block chaining.
Consequently, that makes us to believe that existing
security mechanisms are inadequate, and new ideas are
978-1-4673-5285-7/13/$31.00 ©2013 IEEE
needed. Fortunately, the new problems also inspire new
research and represent an opportunity to properly address
sensor network security from the start.
Motivated with existing research gaps in WSN security we
formulate our findings based on three main questions,
where by first is what are the requirements for designing
reliable security system? Second is how to estimate total
WSN reliability which includes backbone interconnection
and each WSN components and third is how to design
mathematical model of reliable security system and
calculate non-failure operation probability which we further
examine in details from sections 3-4 below.
We assume that the node failures are statistically
independent and imagine that the node meantime- to-failure
(MTTF) is relatively large compared to the message
transmission time, the maximum propagation delay, and,
the time required by the network to adapt to topology
changes due to failures. Therefore the possible estimate of
the operational probability is calculated as MTTF/
(MTTF+MTTR) as detailed in section four of the paper.
The rest of the paper is organized as follow; Section 2
presents the requirements for WSN security and advantages
of our approach. Proposed reliability approach and data
aggregation for security is presented in section 3. The paper
evaluates security verification of WSN mathematically and
system working reliability in sections 4 and gives
conclusion in section 5.
2. SECURITY REQUREMENTS FOR WSN
In many ways security has been viewed as a stand alone
component of a system’s architecture or afterthought,
where a separate module provides security. This separation
is, however, usually a flawed approach to network security.
To achieve a secure system, security must be integrated
into every component. In many cases not integrating
security to components during system development design,
component has turned to be a point of attack. As a result,
security must pervade every aspect of system design. The
proposed approach addresses several aspects, being very
flexible and able to be easily adapted to different kinds of
scenarios when compared with the available approaches in
[15, 17]
To design reliable WSN security system, we follow the
reliability approach taking advantage of security
requirements in a following sequence:
1. Complex parameters for reliability (operational
availability coefficient, availability, operating
efficiency);
2. Reliability requirements (reliability probability, average
time before denial of service, on denial and on fault);
3. Time requirements (various time resources and life
time);
4. Repairability requirements (time for repairing average
active state (serviceable condition), time allowable for
repair);
5 Different types of dependability measures which can be
obtained from the same model (e.g., reliability,
availability, MTTF) as well as the criticality of the
network devices (Birnbaum’s measure).
The reflection of reliability requirements noticed above
gives us the general idea of setting up the calculation of
WSN reliability through interconnected backbone, WSN
component (sensor nodes) which characterizes quality of
the total working system and data aggregation which can
support in providing accurate aggregation results securely
without exhausting the network.
3. COMPLEXITY OF WSN RELIBILITY
We consider WSN as a complex system consists of three
components: sensor nodes grouped to clusters, task
manager node (user, base station) and interconnect
backbone [8], as shown in Figure 1. below. Each Sensor
Node contains various sensors and actuators that are used
to collect let’s say environmental data, process and transmit
them. Collected data are transferred to the base station
through the network.
Direct communication between individual nodes may be
required sometimes. Base station performs tasks in data
storage, analysis, display and control interface backbone
interconnectivity. Due to less stringent limitations, it can
perform significantly more complex tasks than WSN nodes.
Figure 1. Wireless sensor network configuration architecture
Therefore to calculate complex WSN reliability it’s
important to compute the reliability of each WSN
component (interconnected backbone and nodes organized
to clusters [9, 10, 11]). We assume a sensor to be a device
that possesses three basic capabilities: sensing, computing,
and communicating. Sleeping sensor consumes essentially
no energy [15]. In our scenario sensor network is connected
to the outside world through a sink node while having a full
range of computational and communication capabilities and
a renewable power supply. From the presented scenario we
introduce how we calculate interconnectivity reliability for
transmission as follow in section 3.1 below.
3.1 Reliability of Interconnectivity Backbone
To evaluate the reliability and availability of Wireless
Sensor Networks our approach depends on bandwidth
frequency of communication channel, signal power and
noise relation. Therefore maximum transmitting channel
bandwidth ( max
C ) can be calculated as follow:
max
log (1 / )2C F P Ps n= + (1)
where F – backbone interconnectivity frequency; sP –
signal power, n
P – noise power, (1 / )P Ps n+ – number of
signal level which can be accepted by receiver.
E.g., 3/s nP P = this means that power signal is more than
noise power for three times; therefore single signal can
transmit 4 values, i.e. log (1 3) 22 + = bites of data.
We calculate minimum time cycle ( minT ) for signals
transmission with F as follows:
min 1 / (2 )T F= (2)
Then number of unmistakably bites ( C ) transmitted in
channel per sec can be computed as:
2 2
2 [1 log (1 ) log (1 )]C F p p p p= + + − − , (3)
where p is probability of data distortion due to obstacles.
This equation allows exactly estimation of interconnectivity
backbone reliability.
3.2 Wireless Sensor network Reliability
In this presentation, it is assumed that sensor data readings
are sent towards a sink. Sensors are assumed to periodically
send data. Thus, the amount of data readings generated per
time interval in the sensor field is known. Additionally it is
assumed that packet losses are independent of additional
factors such as message size and traffic density. Increases
in message size will increase the probability of bit errors
within a message, but, note that in many forms of
aggregation, packet size remains unchanged or does not
change significantly. Therefore we define reliability of a
WSN as the probability that a minimum aggregate rate of
information ( nfo
P ) that can be delivered to the sink node.
However we characterize quality of the total working
system by efficiency (W) which depends in some
parameters including reliability calculation from [12] and
estimate it as follows:
( )1 2
, ,..., ,n
W f P P P R= (4)
Where 1P , 2P ,..., nP - performance quality of WSN
components; R - total reliability.
If assuming that 0
W is effectiveness with absolute reliable
system functioning, then 0ef
W K W= . Where-
efК means degree of degradation due to unreliability of
WSN components. Effectiveness saving coefficient ( efК )
is taken as an initial factor when analyze system reliability:
0
.ef
W
К
W
= (5)
The effectiveness saving coefficient for WSN is defined by
character of exploitation circle. Exploitation circle of WSN
can be presented as sequence of several conditions i.e. by
( )x t function. If ( ) 1x t = – serviceable condition; 0 –
system denied or on repair. In this case, reliability
estimation corresponds to some function, i.e. ( )i
x t
function, where i means particular system’s element.
Because of active time state, serviceable condition and
repair time which are taken as random values, and ( )i
x t as
a realization of random function ( )x t .
So ( )i
x t can be considered as mathematical operational
model of WSN and named as realization of operational
process. Then estimation of ith
realization, i.e.
functional ( )( )i
x tφ , as a realization of random
quantity ( )( )x tφ . And quantitative index of reliability R
can be considered as operational mathematical of random
quantity ( )( )x tφ which can be calculated as:
( )( )R M x tφ= (6)
where ( )( )x tφ - operational mathematical of random
quantity and where Μ is the required minimum number of
sensor nodes.
The WSN reliability and network parameters, especially
network reliability and data acquisition rate. Can improve
security from the point of system analysis to quality of
services, maximum data transport quantity and quality over
network nodes and backbone connectivity can be calculated
to ensure the safety flow of the information through sensor
nodes.
In order to solve reliability problem task, i.e. finding total
WSN reliability, we prove and analyze mathematically our
approach as:
( )1 1
,..., ; ,...,m n
W f x x y y= (7)
( )1 1
,..., ; ,..., 0k m n
q x x y yψ= = , (8)
Where W- criterion of efficiency; 1
x , 2
x ,..., m
x - controlled
variables; 1
y , 2
y ,..., n
y - uncontrolled variables or random
influence; k
q - restriction function. Assuming that criterion
of efficiency W is already chosen and there are two types
(W) as follows:
Threshold damage as a result of attack. Attack here is
considered implemented if damage is not less than
threshold. In this case, efficiency criterion is a task
performance probability and result can have only two
values: 1 – the attack task overcoming completed by the
system; or 0 – for the opposite case.
Secondly, result of countermeasures increases steadily
depending on damage increasing. In this case the goal of
attack is not achievement of defined result but
implementation of maximum damaging and efficiency
criterion will be calculated as mathematical expectation
damage.
3.3 Classification of Data Aggregation
Scheme.
Data aggregation helps to prevent data redundancy in the
network. As WSN's have high node densities, a node might
receive the same data from more than one neighbor [16].
The paper presents the data aggregation classification for
WSN, based on aggregation method of qiasi-parallelism.
Quasi-parallelism means parallelism of service events
which appear in system at the same time due to the
following advantages it has for the security:
• Ability to reduce the size of the data transmitted
through the network.
• Dynamic response to attack activities by executing of a
self-healing mechanism.
• Dynamic aggregator election/rotation mechanism to
balance the workload at aggregators.
These properties can support in providing accurate
aggregation results securely without exhausting the
network.
In case of close interconnections between system
components (Кi), and input signals of one component are
the output components of another components, its possible
do approximation between these system components
mathematically, which makes it possible to design imitate
model by module principle. If modules have its own unified
structure with input, output and can manage events then
these modules can be considered as aggregators (A).
Some system parts, input-output and information
transmitting channels can be aggregators as well. Thus,
aggregator is a function description of certain object in that
aspects which influence on efficiency estimation of given
system. Every aggregator has only input or output
messages. Aggregator behavior design is successive
transitions chain from one state to another. Therefore we
consider WSN security design as aggregation method of
quasi-parallelism. Figure 2 presents communications of
control program (CP) with aggregators where every
aggregator approximates corresponding functional action
( ,i jFA ). A functional action realizes independency from
each other.
Aggregators: 1 11 12 13 14
{ , , , }K FA FA FA FA
2 21 22 23
{ , , }K FA FA FA
3 31 32 33 34
{ , , , }K FA FA FA FA
Figure 2. Imitation process (aggregator’s activation process)
Every element has connection with another. We assume
that there are only mono-channels for information
transition in this scheme. А0 is an influenced environment
within-research system.
Example: Assume that 32
y is output signal of
aggregator 32
A . Then time for next activation and output
data list are set. Aggregator activation condition is set to
serve the aggregator. Then the commutation matrix should
be created for aggregators’ communication. Having output
signal 32
y CP detects input signal by commutation matrix
( 33
x ) and thus activates aggregator 33
A . When all output
signals ij
Y are served, the designed condition will finish its
checks. The condition set will comprise
1. Choosing minimum time ( ijt ) of aggregator states
which can be used to select parameter location and
aggregator’s activation number at that moment.
2. This aggregator’s number becomes initial value of
aggregators’ activation list and time model shift
occurs: 0
min ijj
t t ti = +
3. The list of activated aggregators will form, i.e.
aggregator activation moment which is equal to new
model time 0t which at the end of this process will
initiate activation of successful aggregators.
Aggregator j
Ai activation means to enable ij
A .
It is necessary to consider some conditions, for example
initial setting of aggregates states at 0t time, definition of
next event time and corresponding aggregator, definition of
new aggregator state and formation of input signals ij
Y as a
result of changing inside states, checking of output signals
and channel number by commutation matrix (R), defining
new aggregate state by the input signal which are coming
and form output signal.
Therefore, is reasonable to use Aggregator method of
imitate modeling with complex objects to secure WSN as
with WSN it’s feasible to take into consideration
commutations matrix making. However signal serving will
require additional machine time which is (key
disadvantage) but aggregate approach will allow
conveniently and strictly description of mathematical
objects. Complex systems designing often use the
following restriction; all component functional actions of
real system are different. That’s why the selection of quasi-
parallelism method was suitable to our approach. This
method is especially effective for objects with high-
specialization of certain operations. In our case consisting
of three components 1 2 3
, ,K K K it’ was convenient to
consider each component as separate processes each of
which describes one process class (setting process,
program-process and input-output process) to ensure
reliability of transmitted data.
4. PROBABILITY VERIFICATION OF
RELIBITY OF THE PROPOSED WSN
APPROACH
The guaranteed delivery of critical data is an essential
requirement in most Wireless Sensor Network (WSN)
applications. Illustrative examples are: battlefield
surveillance, intrusion detection and E-health monitoring
applications, where critical alerts must be timely and
reliably delivered to the monitoring stations that act on
those data; and industrial control applications, where
commands must be timely and reliably delivered to the
actuators (e.g., robotic arm). In this section we present
mathematical reliability proof for WSN:
( )br adv
W P P AP t= , (9)
where W is efficiency criterion which to our case is
dependence of efficiency on reliability, br
P - is probability
of system breaking without fault; adv
P - probability of
security systems overcome by adversary; A - availability;
( )P t - probability of reliable operation within t-time.
From (9)
( )nfo
P AP t= , (10)
where nfo
P - probability of reliable operation.
Subsequently
nfo
br adv
W
P
P P
= (11)
Using (11) we calculate nfo
P taking into consideration br
P ,
adv
P and availability
MTBF
A
MTBF MTTR
=
+
where MTBF and
MTTR are mean time between failure and corresponding
repair mean time, Mean Time between Failure (MTBF)
Mean Time To Repair (MTTR). Then probability
calculation of reliable operation depends on reliability of
each WSN’s component. We calculate it as follows:
( )*
,cl ch bs
P t P P P= (12)
where P*(t) is probability of reliable operation based on
reliability of each component, where clP , chP , bsP - are
probabilities of reliable operation clusters, interconnect
backbone and BS correspondingly [8, 13, 14].
Having these probabilities, we expect ( )*
P t to be
established. Comparing ( )*
P t with required value,
secured requirement measures can be assessed. Hence we
can determine reliability in the following two ways:
1. Exploitation of nodes lifetime with minimum
consumptions.
2. Maximum reliability requirements with given
exploitation cost.
Solving the mentioned problems above “reliability-cost”
direct searching approach can be used. Searching can be
implemented by dynamic programming principle with
maximization of objective function. This also is supposed
to be an opening for future research and part of
continuation of our work.
5. CONCLUSION
In Sensor Network environment security service are of
outmost concern to end user. Reliability to wireless sensor
network for security is studied in this paper. Our work
reveals that reliability is dependent on three elements:
connectivity, network parameters and Data aggregation.
Data aggregation can influence the information transmitted
within WSN in positive manner as illustrated in a proposed
scheme and these influences can be used to control end-to-
end reliability of information delivery. An intuitive
understanding of these relations and all the reliability
criteria in this paper can be feasible for a general network
parameter and security design.
6. REFERENCES
[1] Majeed A, Razak S., Ghazaleh A.B, A. Harras K.A 2009:
TCP over Multi-Hop Wireless Networks: The Impact of
MAC Level Interactions. ADHOC-NOW 2009: 1-15N.
[2] Boudriga N., Baghdadi M., Obaidat M.S, 2006 "A New
Scheme for Mobility, Sensing, and Security Management in
Wireless Ad Hoc Sensor Networks," anss, pp.61-67, 39th
Annual Simulation Symposium (ANSS'06).
[3] Perrig, A. Szewczyk .R, Wen V., Culler D. and Tygar J.D,
2001 .SPINS: Security protocols for sensor networks, Proc.
MOBICOM'2001, Rome, Italy.
[4] Choi J., Choi B.Y, Song S., Hui Lee K.H, 2010: NQAR:
Network Quality Aware Routing in Error-Prone Wireless
Sensor Networks. EURASIP J. Wireless Comm. and
Networking 2010
[5] Koul A., R.B. Patel R.B, Bhat V.K, 2009"Double Split Based
Secure Multipath Routing in Adhoc Networks," artcom,
pp.835-839, 2009 International Conference on Advances in
Recent Technologies in Communication and Computing.
[6] Zia T. and Zomaya A.; 2006. Security Framework for
Wireless Sensor Networks SAS – IEEE Sensors Applications
Symposium, Houston, Texas USA, 7-9 FebrA,
[7] Younis O. and Fahmy S. 2003. MOBICOM, Distributed
Clustering for Scalable, Long-; Lived Sensor Networks,
[8] Ibriq J. and Mahgoub I, 2004. Cluster-based routing in
wireless sensor networks: Issues and Challenges, SPECTS
‘04
[9] Taherkordi A., Alkaee M. T and Sharifi M. 2006.Achieving
Availability and Reliability in Wireless Sensor Networks
Applications, Proceedings of the First International
Conference on Availability, Reliability and Security
(ARES’06)
[10] Chiasserini C.F. and M. Garetto. 2004. Modeling the
Performance of Wireless Sensor Networks, IEEE
INFOCOM.
[11] Frolik J, 2004 .QoS Control for Random Access Wireless
Sensor Networks, WCNC / IEEE Communications Society
[12] Oreku G. S., Jiangzhong Li and Pazynyuk T., 2007. “An
application-driven perspective on wireless devises
security: the case of distributed denial-of-service (ddos)”,
Proceedings of the 2nd ACM workshop on Performance
monitoring and measurement of heterogeneous wireless and
wired networks, Pages: 81 - 83, Chania, Crete Island, Greece.
[13] Jang K.W, Lee S.H, Jun M.S, 2006"Design of Secure
Dynamic Clustering Algorithm using SNEP and ?TESLA in
Sensor network," ichit, vol. 2, pp.97-102, 2006 International
Conference on Hybrid Information Technology – Vol 2
(ICHIT'06)
[14] Kumar G. , R. Mritunjay and L. Gang-soo ; 2012
Implementation of Cipher Block Chaining in Wireless
Sensor Networks for Security Enhancement International
Journal of Security and Its Applications Vol. 6, No. 1,
January, 2012
[15] AboElFotoh H., Shazly M., Elmallah E., Harms J. On area
coverage reliability of wireless sensor networks. Proceedings
of the 36th Annual IEEE Conference on Local Computer
Networks (LCN ’11); Bonn, Germany. 4–7 October 2011;
pp. 584–592.
[16] Valada A., David K., Kantor G.; 2010 “Design and
Development of a Wireless Sensor Network System for
Precision Agriculture” CMU-RI-TR-10-21.
[17] Egeland G., Engelstad P. The availability and reliability of
wireless multi-hop networks with stochastic link failures.
IEEE J. Sel. Areas Commun. 2009; 27:1132–1146.

More Related Content

What's hot

WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...cscpconf
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...sangasandeep
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksIAEME Publication
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSIJNSA Journal
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toeSAT Publishing House
 

What's hot (18)

WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
 
A0320105
A0320105A0320105
A0320105
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
O010528791
O010528791O010528791
O010528791
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANET
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 

Viewers also liked

Reliability in wsn for security
Reliability in wsn for securityReliability in wsn for security
Reliability in wsn for securitySwamy Vivekananda
 
Contractor Management Strategies in a Complex World
Contractor Management Strategies in a Complex WorldContractor Management Strategies in a Complex World
Contractor Management Strategies in a Complex Worldbrowzcompliance
 
Top 10 Reasons Why Supplier Qualification Fails
Top 10 Reasons Why Supplier Qualification FailsTop 10 Reasons Why Supplier Qualification Fails
Top 10 Reasons Why Supplier Qualification Failsbrowzcompliance
 
How to improve your contractor management program
How to improve your contractor management programHow to improve your contractor management program
How to improve your contractor management programbrowzcompliance
 
Professional Technology Use Presentation
Professional Technology Use PresentationProfessional Technology Use Presentation
Professional Technology Use Presentationbrittanywentsel
 
25422733 c-programming-and-data-structures-lab-manual
25422733 c-programming-and-data-structures-lab-manual25422733 c-programming-and-data-structures-lab-manual
25422733 c-programming-and-data-structures-lab-manualkamesh dagia
 

Viewers also liked (8)

Life After BROWZ
Life After BROWZLife After BROWZ
Life After BROWZ
 
Reliability in wsn for security
Reliability in wsn for securityReliability in wsn for security
Reliability in wsn for security
 
Contractor Management Strategies in a Complex World
Contractor Management Strategies in a Complex WorldContractor Management Strategies in a Complex World
Contractor Management Strategies in a Complex World
 
Top 10 Reasons Why Supplier Qualification Fails
Top 10 Reasons Why Supplier Qualification FailsTop 10 Reasons Why Supplier Qualification Fails
Top 10 Reasons Why Supplier Qualification Fails
 
How to improve your contractor management program
How to improve your contractor management programHow to improve your contractor management program
How to improve your contractor management program
 
Professional Technology Use Presentation
Professional Technology Use PresentationProfessional Technology Use Presentation
Professional Technology Use Presentation
 
25422733 c-programming-and-data-structures-lab-manual
25422733 c-programming-and-data-structures-lab-manual25422733 c-programming-and-data-structures-lab-manual
25422733 c-programming-and-data-structures-lab-manual
 
Office ergonomics
Office ergonomicsOffice ergonomics
Office ergonomics
 

Similar to Reliability in wsn for security

Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworksIOSR Journals
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
G041124047
G041124047G041124047
G041124047IOSR-JEN
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chIJECEIAES
 
Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...IJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksIJERA Editor
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...IJNSA Journal
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdfVenu Madhav
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
 

Similar to Reliability in wsn for security (20)

iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
G041124047
G041124047G041124047
G041124047
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
 
Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Reliability in wsn for security

  • 1. Reliability in WSN for Security: Mathematical Approach. George S. Oreku 1,2 1 Tanzania Industrial Reseach and Development Organization (TIRDO) P.O Box23235 DSM Tanzania 2 School of Information Technology North West University - Vaal Triangle Campus, 1900 South Africa, P.O.Box1174 vanderbijlpark +27 762378953 George.oreku@gmail.com ABSTRACT Modern wireless sensor networks require specific and high degree of security due to their limitation and versatility tasks. The absence of permanent infrastructure makes these networks suitable for many civilian applications. But their limited computational ability and battery resources restrictions makes them vulnerable to many kinds of attacks. This paper presents reliability in Wireless Sensor Network (WSN) information transmition, which can be used to exactly estimate the system working quality. The WSN reliability mathematical calculation approach presented in this paper gives insight on how to secure WSN through reliable backbone connectivity, reliable sensor network and data aggregation. Solutions to meet WSN security interconnectivity reliability, network reliability and data aggregation scheme for robust security systems designing also have been introduced. Keywords Networks, WSN Security, WSN, Design, Security, Data Delivery, Reliability. 1. INTRODUCTION Sensor networks are being deployed in situations where it is important to protect the message communication from eavesdropping or tampering. Wireless Sensor network (WSN) consists of sensor nodes which are deployed in versatile and often potentially hostile environment, responsible for sensing, processing, and transferring environmental information on the sensor field towards the sink node that is often referred to as BS (Base Station) as can be seen on figure one below. The absence of fixed infrastructure and cost effectiveness makes WSN ideal for civilian applications such as disaster relief, emergency rescue operations, patient monitoring, environmental control, military applications such as target identification and tracking as well as surveillance networks. These applications require that sensor networks offer a high degree of security. An adversary can thwart the work of any part of the network by perturbing the information produced, stopping production, or pilfering information to all what has been mentioned above as function or application of WSN. To reduce the vulnerability paper [1] argues that, the WSN design must balance traditional objectives such as energy efficiency, cost, and application level performance with security to the higher degree than attacker’s competence. The authors in [2] developed architecture and associated algorithms to build a self-organizing WSN system that is capable of detecting mobile targets using cooperative sensors that are randomly deployed in a physical environment. The primary focus presented in manuscript [3] is to providing security mechanisms that enables the secure operation of in-network processing, a key emerging theme in the design and deployment of WSN. Jones et al. in [4] described a WSN model and proposed a solution which uses parameterized frequency hopping and cryptographic keys to provide differential security services and readily applicable to WSNs having anonymous nodes that are unaware of location. Perrig et al also proposed SPINS [5], a general security infrastructure for WSN. The infrastructure consists of an encryption primitive; SNEP, and an authenticated streaming broadcast primitive, micro TESLA have been well discussed in [14]. In [6], an algorithm to reliably transfer data by using one-phase pull directed diffusion, a data-centric routing technique in WSNs have been presented. However the research in papers [7, 14] presents the ideas on how to improve and enhance security and performance of an Ad Hoc networks through a multipath routing strategy and cipher block chaining. Consequently, that makes us to believe that existing security mechanisms are inadequate, and new ideas are 978-1-4673-5285-7/13/$31.00 ©2013 IEEE
  • 2. needed. Fortunately, the new problems also inspire new research and represent an opportunity to properly address sensor network security from the start. Motivated with existing research gaps in WSN security we formulate our findings based on three main questions, where by first is what are the requirements for designing reliable security system? Second is how to estimate total WSN reliability which includes backbone interconnection and each WSN components and third is how to design mathematical model of reliable security system and calculate non-failure operation probability which we further examine in details from sections 3-4 below. We assume that the node failures are statistically independent and imagine that the node meantime- to-failure (MTTF) is relatively large compared to the message transmission time, the maximum propagation delay, and, the time required by the network to adapt to topology changes due to failures. Therefore the possible estimate of the operational probability is calculated as MTTF/ (MTTF+MTTR) as detailed in section four of the paper. The rest of the paper is organized as follow; Section 2 presents the requirements for WSN security and advantages of our approach. Proposed reliability approach and data aggregation for security is presented in section 3. The paper evaluates security verification of WSN mathematically and system working reliability in sections 4 and gives conclusion in section 5. 2. SECURITY REQUREMENTS FOR WSN In many ways security has been viewed as a stand alone component of a system’s architecture or afterthought, where a separate module provides security. This separation is, however, usually a flawed approach to network security. To achieve a secure system, security must be integrated into every component. In many cases not integrating security to components during system development design, component has turned to be a point of attack. As a result, security must pervade every aspect of system design. The proposed approach addresses several aspects, being very flexible and able to be easily adapted to different kinds of scenarios when compared with the available approaches in [15, 17] To design reliable WSN security system, we follow the reliability approach taking advantage of security requirements in a following sequence: 1. Complex parameters for reliability (operational availability coefficient, availability, operating efficiency); 2. Reliability requirements (reliability probability, average time before denial of service, on denial and on fault); 3. Time requirements (various time resources and life time); 4. Repairability requirements (time for repairing average active state (serviceable condition), time allowable for repair); 5 Different types of dependability measures which can be obtained from the same model (e.g., reliability, availability, MTTF) as well as the criticality of the network devices (Birnbaum’s measure). The reflection of reliability requirements noticed above gives us the general idea of setting up the calculation of WSN reliability through interconnected backbone, WSN component (sensor nodes) which characterizes quality of the total working system and data aggregation which can support in providing accurate aggregation results securely without exhausting the network. 3. COMPLEXITY OF WSN RELIBILITY We consider WSN as a complex system consists of three components: sensor nodes grouped to clusters, task manager node (user, base station) and interconnect backbone [8], as shown in Figure 1. below. Each Sensor Node contains various sensors and actuators that are used to collect let’s say environmental data, process and transmit them. Collected data are transferred to the base station through the network. Direct communication between individual nodes may be required sometimes. Base station performs tasks in data storage, analysis, display and control interface backbone interconnectivity. Due to less stringent limitations, it can perform significantly more complex tasks than WSN nodes. Figure 1. Wireless sensor network configuration architecture Therefore to calculate complex WSN reliability it’s important to compute the reliability of each WSN component (interconnected backbone and nodes organized to clusters [9, 10, 11]). We assume a sensor to be a device that possesses three basic capabilities: sensing, computing, and communicating. Sleeping sensor consumes essentially no energy [15]. In our scenario sensor network is connected to the outside world through a sink node while having a full range of computational and communication capabilities and a renewable power supply. From the presented scenario we introduce how we calculate interconnectivity reliability for transmission as follow in section 3.1 below.
  • 3. 3.1 Reliability of Interconnectivity Backbone To evaluate the reliability and availability of Wireless Sensor Networks our approach depends on bandwidth frequency of communication channel, signal power and noise relation. Therefore maximum transmitting channel bandwidth ( max C ) can be calculated as follow: max log (1 / )2C F P Ps n= + (1) where F – backbone interconnectivity frequency; sP – signal power, n P – noise power, (1 / )P Ps n+ – number of signal level which can be accepted by receiver. E.g., 3/s nP P = this means that power signal is more than noise power for three times; therefore single signal can transmit 4 values, i.e. log (1 3) 22 + = bites of data. We calculate minimum time cycle ( minT ) for signals transmission with F as follows: min 1 / (2 )T F= (2) Then number of unmistakably bites ( C ) transmitted in channel per sec can be computed as: 2 2 2 [1 log (1 ) log (1 )]C F p p p p= + + − − , (3) where p is probability of data distortion due to obstacles. This equation allows exactly estimation of interconnectivity backbone reliability. 3.2 Wireless Sensor network Reliability In this presentation, it is assumed that sensor data readings are sent towards a sink. Sensors are assumed to periodically send data. Thus, the amount of data readings generated per time interval in the sensor field is known. Additionally it is assumed that packet losses are independent of additional factors such as message size and traffic density. Increases in message size will increase the probability of bit errors within a message, but, note that in many forms of aggregation, packet size remains unchanged or does not change significantly. Therefore we define reliability of a WSN as the probability that a minimum aggregate rate of information ( nfo P ) that can be delivered to the sink node. However we characterize quality of the total working system by efficiency (W) which depends in some parameters including reliability calculation from [12] and estimate it as follows: ( )1 2 , ,..., ,n W f P P P R= (4) Where 1P , 2P ,..., nP - performance quality of WSN components; R - total reliability. If assuming that 0 W is effectiveness with absolute reliable system functioning, then 0ef W K W= . Where- efК means degree of degradation due to unreliability of WSN components. Effectiveness saving coefficient ( efК ) is taken as an initial factor when analyze system reliability: 0 .ef W К W = (5) The effectiveness saving coefficient for WSN is defined by character of exploitation circle. Exploitation circle of WSN can be presented as sequence of several conditions i.e. by ( )x t function. If ( ) 1x t = – serviceable condition; 0 – system denied or on repair. In this case, reliability estimation corresponds to some function, i.e. ( )i x t function, where i means particular system’s element. Because of active time state, serviceable condition and repair time which are taken as random values, and ( )i x t as a realization of random function ( )x t . So ( )i x t can be considered as mathematical operational model of WSN and named as realization of operational process. Then estimation of ith realization, i.e. functional ( )( )i x tφ , as a realization of random quantity ( )( )x tφ . And quantitative index of reliability R can be considered as operational mathematical of random quantity ( )( )x tφ which can be calculated as: ( )( )R M x tφ= (6) where ( )( )x tφ - operational mathematical of random quantity and where Μ is the required minimum number of sensor nodes. The WSN reliability and network parameters, especially network reliability and data acquisition rate. Can improve security from the point of system analysis to quality of services, maximum data transport quantity and quality over network nodes and backbone connectivity can be calculated to ensure the safety flow of the information through sensor nodes. In order to solve reliability problem task, i.e. finding total WSN reliability, we prove and analyze mathematically our approach as: ( )1 1 ,..., ; ,...,m n W f x x y y= (7) ( )1 1 ,..., ; ,..., 0k m n q x x y yψ= = , (8) Where W- criterion of efficiency; 1 x , 2 x ,..., m x - controlled variables; 1 y , 2 y ,..., n y - uncontrolled variables or random influence; k q - restriction function. Assuming that criterion
  • 4. of efficiency W is already chosen and there are two types (W) as follows: Threshold damage as a result of attack. Attack here is considered implemented if damage is not less than threshold. In this case, efficiency criterion is a task performance probability and result can have only two values: 1 – the attack task overcoming completed by the system; or 0 – for the opposite case. Secondly, result of countermeasures increases steadily depending on damage increasing. In this case the goal of attack is not achievement of defined result but implementation of maximum damaging and efficiency criterion will be calculated as mathematical expectation damage. 3.3 Classification of Data Aggregation Scheme. Data aggregation helps to prevent data redundancy in the network. As WSN's have high node densities, a node might receive the same data from more than one neighbor [16]. The paper presents the data aggregation classification for WSN, based on aggregation method of qiasi-parallelism. Quasi-parallelism means parallelism of service events which appear in system at the same time due to the following advantages it has for the security: • Ability to reduce the size of the data transmitted through the network. • Dynamic response to attack activities by executing of a self-healing mechanism. • Dynamic aggregator election/rotation mechanism to balance the workload at aggregators. These properties can support in providing accurate aggregation results securely without exhausting the network. In case of close interconnections between system components (Кi), and input signals of one component are the output components of another components, its possible do approximation between these system components mathematically, which makes it possible to design imitate model by module principle. If modules have its own unified structure with input, output and can manage events then these modules can be considered as aggregators (A). Some system parts, input-output and information transmitting channels can be aggregators as well. Thus, aggregator is a function description of certain object in that aspects which influence on efficiency estimation of given system. Every aggregator has only input or output messages. Aggregator behavior design is successive transitions chain from one state to another. Therefore we consider WSN security design as aggregation method of quasi-parallelism. Figure 2 presents communications of control program (CP) with aggregators where every aggregator approximates corresponding functional action ( ,i jFA ). A functional action realizes independency from each other. Aggregators: 1 11 12 13 14 { , , , }K FA FA FA FA 2 21 22 23 { , , }K FA FA FA 3 31 32 33 34 { , , , }K FA FA FA FA Figure 2. Imitation process (aggregator’s activation process) Every element has connection with another. We assume that there are only mono-channels for information transition in this scheme. А0 is an influenced environment within-research system. Example: Assume that 32 y is output signal of aggregator 32 A . Then time for next activation and output data list are set. Aggregator activation condition is set to serve the aggregator. Then the commutation matrix should be created for aggregators’ communication. Having output signal 32 y CP detects input signal by commutation matrix ( 33 x ) and thus activates aggregator 33 A . When all output signals ij Y are served, the designed condition will finish its checks. The condition set will comprise 1. Choosing minimum time ( ijt ) of aggregator states which can be used to select parameter location and aggregator’s activation number at that moment. 2. This aggregator’s number becomes initial value of aggregators’ activation list and time model shift occurs: 0 min ijj t t ti = + 3. The list of activated aggregators will form, i.e. aggregator activation moment which is equal to new model time 0t which at the end of this process will initiate activation of successful aggregators. Aggregator j Ai activation means to enable ij A .
  • 5. It is necessary to consider some conditions, for example initial setting of aggregates states at 0t time, definition of next event time and corresponding aggregator, definition of new aggregator state and formation of input signals ij Y as a result of changing inside states, checking of output signals and channel number by commutation matrix (R), defining new aggregate state by the input signal which are coming and form output signal. Therefore, is reasonable to use Aggregator method of imitate modeling with complex objects to secure WSN as with WSN it’s feasible to take into consideration commutations matrix making. However signal serving will require additional machine time which is (key disadvantage) but aggregate approach will allow conveniently and strictly description of mathematical objects. Complex systems designing often use the following restriction; all component functional actions of real system are different. That’s why the selection of quasi- parallelism method was suitable to our approach. This method is especially effective for objects with high- specialization of certain operations. In our case consisting of three components 1 2 3 , ,K K K it’ was convenient to consider each component as separate processes each of which describes one process class (setting process, program-process and input-output process) to ensure reliability of transmitted data. 4. PROBABILITY VERIFICATION OF RELIBITY OF THE PROPOSED WSN APPROACH The guaranteed delivery of critical data is an essential requirement in most Wireless Sensor Network (WSN) applications. Illustrative examples are: battlefield surveillance, intrusion detection and E-health monitoring applications, where critical alerts must be timely and reliably delivered to the monitoring stations that act on those data; and industrial control applications, where commands must be timely and reliably delivered to the actuators (e.g., robotic arm). In this section we present mathematical reliability proof for WSN: ( )br adv W P P AP t= , (9) where W is efficiency criterion which to our case is dependence of efficiency on reliability, br P - is probability of system breaking without fault; adv P - probability of security systems overcome by adversary; A - availability; ( )P t - probability of reliable operation within t-time. From (9) ( )nfo P AP t= , (10) where nfo P - probability of reliable operation. Subsequently nfo br adv W P P P = (11) Using (11) we calculate nfo P taking into consideration br P , adv P and availability MTBF A MTBF MTTR = + where MTBF and MTTR are mean time between failure and corresponding repair mean time, Mean Time between Failure (MTBF) Mean Time To Repair (MTTR). Then probability calculation of reliable operation depends on reliability of each WSN’s component. We calculate it as follows: ( )* ,cl ch bs P t P P P= (12) where P*(t) is probability of reliable operation based on reliability of each component, where clP , chP , bsP - are probabilities of reliable operation clusters, interconnect backbone and BS correspondingly [8, 13, 14]. Having these probabilities, we expect ( )* P t to be established. Comparing ( )* P t with required value, secured requirement measures can be assessed. Hence we can determine reliability in the following two ways: 1. Exploitation of nodes lifetime with minimum consumptions. 2. Maximum reliability requirements with given exploitation cost. Solving the mentioned problems above “reliability-cost” direct searching approach can be used. Searching can be implemented by dynamic programming principle with maximization of objective function. This also is supposed to be an opening for future research and part of continuation of our work. 5. CONCLUSION In Sensor Network environment security service are of outmost concern to end user. Reliability to wireless sensor network for security is studied in this paper. Our work reveals that reliability is dependent on three elements: connectivity, network parameters and Data aggregation. Data aggregation can influence the information transmitted within WSN in positive manner as illustrated in a proposed scheme and these influences can be used to control end-to- end reliability of information delivery. An intuitive understanding of these relations and all the reliability criteria in this paper can be feasible for a general network parameter and security design. 6. REFERENCES [1] Majeed A, Razak S., Ghazaleh A.B, A. Harras K.A 2009: TCP over Multi-Hop Wireless Networks: The Impact of MAC Level Interactions. ADHOC-NOW 2009: 1-15N.
  • 6. [2] Boudriga N., Baghdadi M., Obaidat M.S, 2006 "A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks," anss, pp.61-67, 39th Annual Simulation Symposium (ANSS'06). [3] Perrig, A. Szewczyk .R, Wen V., Culler D. and Tygar J.D, 2001 .SPINS: Security protocols for sensor networks, Proc. MOBICOM'2001, Rome, Italy. [4] Choi J., Choi B.Y, Song S., Hui Lee K.H, 2010: NQAR: Network Quality Aware Routing in Error-Prone Wireless Sensor Networks. EURASIP J. Wireless Comm. and Networking 2010 [5] Koul A., R.B. Patel R.B, Bhat V.K, 2009"Double Split Based Secure Multipath Routing in Adhoc Networks," artcom, pp.835-839, 2009 International Conference on Advances in Recent Technologies in Communication and Computing. [6] Zia T. and Zomaya A.; 2006. Security Framework for Wireless Sensor Networks SAS – IEEE Sensors Applications Symposium, Houston, Texas USA, 7-9 FebrA, [7] Younis O. and Fahmy S. 2003. MOBICOM, Distributed Clustering for Scalable, Long-; Lived Sensor Networks, [8] Ibriq J. and Mahgoub I, 2004. Cluster-based routing in wireless sensor networks: Issues and Challenges, SPECTS ‘04 [9] Taherkordi A., Alkaee M. T and Sharifi M. 2006.Achieving Availability and Reliability in Wireless Sensor Networks Applications, Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06) [10] Chiasserini C.F. and M. Garetto. 2004. Modeling the Performance of Wireless Sensor Networks, IEEE INFOCOM. [11] Frolik J, 2004 .QoS Control for Random Access Wireless Sensor Networks, WCNC / IEEE Communications Society [12] Oreku G. S., Jiangzhong Li and Pazynyuk T., 2007. “An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos)”, Proceedings of the 2nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, Pages: 81 - 83, Chania, Crete Island, Greece. [13] Jang K.W, Lee S.H, Jun M.S, 2006"Design of Secure Dynamic Clustering Algorithm using SNEP and ?TESLA in Sensor network," ichit, vol. 2, pp.97-102, 2006 International Conference on Hybrid Information Technology – Vol 2 (ICHIT'06) [14] Kumar G. , R. Mritunjay and L. Gang-soo ; 2012 Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement International Journal of Security and Its Applications Vol. 6, No. 1, January, 2012 [15] AboElFotoh H., Shazly M., Elmallah E., Harms J. On area coverage reliability of wireless sensor networks. Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN ’11); Bonn, Germany. 4–7 October 2011; pp. 584–592. [16] Valada A., David K., Kantor G.; 2010 “Design and Development of a Wireless Sensor Network System for Precision Agriculture” CMU-RI-TR-10-21. [17] Egeland G., Engelstad P. The availability and reliability of wireless multi-hop networks with stochastic link failures. IEEE J. Sel. Areas Commun. 2009; 27:1132–1146.