SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 495
Security Management in Wireless Sensor Network (WSN)
Sumant Verma
Indore Institute of Science & Technology, Rau - Pithampur Rd, Opposite Indian Institute of Management, Rau,
Indore, Madhya Pradesh 453331
Student,4th Semester Dept. of Computer Science & Engineering, Indore Institute of Science & Technology, Madhya
Pradesh, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Wireless Sensor Network (WSN) plays a vital role
in emerging sensing technology. Theyareused invariousfields
such as military operations, healthcare applications, traffic
control, and home applications. Even sensor can monitor,
pressure, humidity, noise level, temperature, soil makeup and
other properties. Wireless Sensor Network can be of consist of
different types of sensors like thermal, visual, infrared,
acoustic and radar. Wireless Sensor Network (WSN) is
broadcast nature of the wireless communicationsoitbecomes
easy for the attacker to send false data or false information to
compromise the entire network due to which there are high
chances that causes problem in making decision. Here the
solution proposed is MAC (Message Authentication Code),
Authentication is necessary for many administrative tasks
informally; data authenticationallowsareceivertoverifythat
the data really is sent by the claimed sender. If the message is
from claimed sender then the message or information is
accepted or if the message is from not from theclaimedsender
then the message or information is not accepted.
Key Words: Wireless Sensor Network (WSN), MAC
(Message Authentication Code), Attacker, Security
1. INTRODUCTION
The Wireless Sensor Network (WSN)consistsofsensorsthat
are tiny in size and have the capability of sensing things and
communicating with other devices,overa specific area.They
are low cost solutions for variety of real world applications.
Wireless Sensor Network (WSN) sensors are small in size
and low power. Also the main problem of the sensoristhatit
has very low storage, so whatever algorithm or program is
written for securing the network, it has to very small and
efficient in order to work properly. WirelessSensorNetwork
(WSN) is broadcast in nature means the network can be
compromised by the attacker. The attacks can target any
node, this can lead to leak secret information andinterfering
message which ultimately violates security. Therefore
authenticity is a mandatory service for securing Wireless
Sensor Network (WSN), because message modification or
message falsification is problems that need to be solved.
Architecture of Wireless Sensor Network (WSN):
Wireless Sensor Network (WSN) consists of following
components:
1. Sensor Node: - It is low powered, small in size and
has low storage. It includes radio transceiver, an
antenna, a microcontroller and for energya battery.
2. Gateway: - It enables communication betweenhost
application and field devices.
3. Network Manager: - It is responsible for
configuration of the network scheduling.
Fig 1. Architecture of WSN
Advantages of Wireless Sensor Network (WSN):
๏‚ท New nodes or devices can be added at any time.
๏‚ท All nodes can be accessed through centralized
monitoring system.
๏‚ท Since it is wireless in nature so it is cost efficient as
it does not require wires and cables.
๏‚ท They can be used in variety of domains such as
military, healthcare, agriculture, mines etc.
Disadvantages of Wireless Sensor Network (WSN):
๏‚ท Sensors have low storage and low powered battery.
๏‚ท It cannot be used forhighspeedcommunicationdue
to low bandwidth.
๏‚ท It is wireless in nature, so it can be hacked easily by
the attacker.
๏‚ท It is expensive to build such network.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 496
Applications of Wireless Sensor Network (WSN):
๏‚ท It can be used in environmental applications like to
track movement of birds,small animals,andinsects.
๏‚ท It can be used in military applications.
๏‚ท It can be used in health applications like to monitor
a patient or monitor internal process of small
animals.
๏‚ท It can be used in agriculture applications like to
monitor temperature, measuring water supply and
so on.
Fig 2. Diagram of WSN Applications
2. RELATED STUDY
There are several proposals for implementing authenticity
services on Wireless Sensor Network (WSN), the most are
based on symmetric techniques and only a few ones involve
public key cryptographyindirectly.Symmetriccryptography
offers low complexity in algorithms and small data pieces to
manipulate and store. However scalability and flexibility are
the drawbacks in these techniques. This approach has been
explored in several proposals for implement security
services using symmetric encryption, keyed and un-keyed
hash functions and pre-distribution key techniques as
proposed in the work of Du and Li among others. Oliveira et
al. proposed in a key distribution method that allows to two
nodes to agree a common key. Oliveiraโ€™s approach explodes
the use of IBC to accomplish the key exchange.
Survey: - Many researchers have proposed the mechanism
attacks. The research in field of security in Wireless Sensor
Network (WSN) issues, challenges and solution which have
been taken help are as follows:
Table 1. Researchers/Authors with their methods and
details.
Authors/Researchers Description
Prachi Pathak and Amzad
Quaz
Proposed directional
antenna, cryptography and
key management protocol.
Classification of attacks in
WSN.
Moises Salinas Rosales, Gina
Gallegos Garcia, Gonzalo
Duchen Sanchez Moises
Salinas Rosales, Gina
Gallegos Garcia, Gonzalo
Duchen Sanchez
Proposed security solution
through cryptography and
MAC.
Prashant Shukla Proposed securityissuesand
challenges in WSN and
provided the defense and
counteraction research
solution to the security.
Swati Bartariya and
Ashutosh Rastogi
Identify the security threats
and attacks in WSN with
security solutions.
A.K. Nuristani and Jawahar
Thakur
About security, challenges,
solutions like MAC, key
management, encryption.
Amit Kumar Gautam,Rakesh
Kumar
Description on various trust
management, authentication
and key management
schemes.
Jian Wang Solving security problem by
key management scheme.
3. PROPOSED SOLUTION
To know that the message or information is coming from
actual sender we are using Message Authentication Code
(MAC) in the Wireless Sensor Network (WSN).HereMessage
Authentication Code (MAC) contains cryptographicprocess.
With the help of symmetric key the cryptographic process is
implemented for sender andreceiver.Wehaveimplemented
in python language since it will take less memory as sensors
consist of less and limited memory.
In the block diagram Fig 3, sender wants to send message
and sender apply Symmetric Key (K) and generates MAC
value say H1 then the message and MAC value H1 alongwith
the message is received by the receiver. Now receiver will
also calculates its MAC value say H2 with the same
Symmetric Key (K) used by the sender. Then there will be
comparison is done between MAC values H1 and H2. If MAC
value H1 and MAC value H2 are same that means there is no
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 497
change in the message by the attacker or hacker and we can
accept that message. But if MAC value H1 and MAC value H2
are not same that means the message has been changed by
the attacker or hacker and we cannot accept thatmessage as
the message is corrupted that can lead to misleading in
taking important decisions.
Fig 3. Implementation Diagram
Proposed Program
import hashlib
import base64
#Sender and Receiver share a secret key
secret_key = "secret key".encode()
#Sender generates MAC
message = "Information from sender!!!".encode()
sha256 = hashlib.sha256()
sha256.update(secret_key)
sha256.update(message)
h1mac = sha256.digest()
#Receiver receives and validates MAC
sha256 = hashlib.sha256()
sha256.update(secret_key)
sha256.update(message)
h2mac = sha256.digest()
if (h1mac==h2mac):
print("---Message and MAC from Sender---")
print(message,'***', h1mac)
print("---Message and MAC from Receiver---")
print(message,'***', h2mac)
else:
print("Network Compromised")
Table 2. Implemented Modules
S. No. MODULE DESCRIPTION
1.
hashlib
It is an interface for hashing
messages easily. This contains
numerous methods which will
handle hashing any raw
message in an encrypted
format. The core purposeofthis
module is to use a hash function
on a string, and encrypt it so
that it is very difficulttodecrypt
it.
2.
base64
In Python the base64 module
is used to encode and decode
data. First, the strings are
converted into byte-like objects
and then encoded using the
base64 module.
Table 3. Implemented Methods
S.No. MODULE DESCRIPTION
1. encode
The encode()
method encodes the string,
using the specified encoding.
2. update Update the hmac object
with msg.
3. digest
This method is used to return
the digested data which is
passed through the update
method.
4. CONCLUSIONS
This paper presents details study on the securityofWireless
Sensor Network (WSN). Firstly, introducing about Wireless
Sensor Network (WSN) in detail and then discussed about
the security issue. Security is an important requirement
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 498
because the application of Wireless Sensor Network (WSN)
will be deeper and wider like in healthcare and military
purposes. Wireless Sensor Network (WSN) product in
industry will not get acceptance unless there is a full proof
security to the network. There are limitations in sensorslike
low power energy and low space storage. To overcome the
problem of security usually keeping in mind about the low
storage, we provided Message Authentication Code (MAC)
use, because of this it is guaranteed that the message is to
from authenticated to the source. It takes less computing
load, high security, less computing load, efficient utilization
of resources such as memory, bandwidth, and power.
REFERENCES
[1] Jeevan Kumar and Sushanta Mahanty, Security in
wireless network, IJERT, 2013
[2] Nidhi Chandra and Saima Maqbool, Categorized security
threats in WSN, International Journal of Computer
Applications, February 2013
[3] Prachi Pathak and Amzad Quaz, Issues, Challenges and
Solution in WSN, International Journal of Electrical, 2017
[4] Ankur Sirohi and Dr. Amit K. Agarwal, Security in (WSN),
2020
[5] Zhang Huanan, Xing Suping and Wang Jiannan, Security
and application of (WSN), ICICT-2020
[6] Riaz Shaik and Shaik Shakeed Ahamad, Security Attacks
and Challenges of (WSN), International Journal of
Engineering & Technology, 2018
[7] Saqib Ali, Taiseera Al-Balushi, Omar Khadeer Hussain,
Improving The Resilience of WSNs AgainstSecurityThreats,
IJT, 2018
[8] Selcuk Uluagac, Christopher P. Lee and John A.
Copeland,Designing Secure Protocols for WSNs
[9] Fei Hu, jim Ziobro, Jason Tillett and Neeraj K. Sharma,
Secure (WSN):Problems and Solutions, IEEE
[10] Hyung-Woo Lee and Choong Seon Hong, Security in
(WSN):Issues and Challenges
[11] Preetkamal Singh, Dr. OP Gupta and Sita Saini, A Brief
Study of WSN, Advances in Computational Sciences and
Technology, 2017
[12] Shengjun Xie, Xiang Wang and Hua Shang, Security
Analysis on WSN in the Data Center for Energy Internet of
Things, 2020
[13] Vishal Rathod and Mrudang Mehta, Security in WSN,
Ganpat University Journal of Engineering & Technology,
2011
[14] A.K. Nuristani and Jawahar Thakur, Security Issues
and Comparative Analysis of Security Protocols inWSN,
JCSE, 2018
[15] MOISES SALINAS ROSALES, GINA GALLEGOS
GARCIA, GONZALO DUCHEN SANCHEZ, Efficient
Message Authentication Protocol for WSN, Issue 6,
Volume 8, June 2009
[16] M. B. Apsara, P. Dayananda, C. N. Sowmyarani, A
Review on Secure Group Key Management Schemes for
Data Gathering in WirelessSensorNetworks,Vol.10,No.
1, 2020
[17] Amit Kumar Gautam, Rakesh Kumar, A
comprehensive study on key management,
authentication and trust management techniques in
wireless sensor networks, 09 January 2021
[18] Oladayo Olufemi Olakanmi and Adedamola Dada,
Wireless Sensor Networks(WSNs):SecurityandPrivacy
Issues and Solutions, Submitted: August 28th, 2018
Reviewed: February 6th, 2019Published: March 29th,
2020
[19] Prashant Shukla, Security Issues, Challenges and
Solutions for Wireless Sensor networks
[20] Mauricio Tellez Nava, Improving the security of
WSN, 2016
[21] Jaydip Sen, Security in Wireless Sensor Networks
[22] M.B. Apsara, P.Dayananda and C.N.Sowyarani, A
Review on Secure Group Key Management Schemes for
Data Gathering in WSN, Vol. 10, No. 1, 2020
[23] Jian Wang, Secured Communications in Wireless
Sensor Networks
[24] Swati Bartariya and Ashutosh Rastogi, Securtiy in
Wireless Sensor Networks: Attacks and Solutions,
IJARCCE

More Related Content

Similar to Security Management in Wireless Sensor Network (WSN)

Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
ย 

Similar to Security Management in Wireless Sensor Network (WSN) (20)

Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksReview for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
ย 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
ย 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
ย 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
ย 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
ย 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
ย 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
ย 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
ย 
Rough set method-cloud internet of things: a two-degree verification scheme ...
Rough set method-cloud internet of things: a two-degree  verification scheme ...Rough set method-cloud internet of things: a two-degree  verification scheme ...
Rough set method-cloud internet of things: a two-degree verification scheme ...
ย 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
ย 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
ย 
1678 1683
1678 16831678 1683
1678 1683
ย 
1678 1683
1678 16831678 1683
1678 1683
ย 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
ย 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
ย 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
ย 
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
IRJET- Detection and Localization of Spoofing Attackers in Wireless Sensor Ne...
ย 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
ย 
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNSecure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
ย 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
ย 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
ย 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
ย 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
ย 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
ย 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
ย 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
ย 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
ย 
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
ย 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
ย 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
ย 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
ย 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
ย 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
ย 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
ย 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
ย 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
ย 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
ย 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
ย 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
ย 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
ย 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
ย 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
ย 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
ย 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
ย 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ย 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
ย 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 

Security Management in Wireless Sensor Network (WSN)

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 495 Security Management in Wireless Sensor Network (WSN) Sumant Verma Indore Institute of Science & Technology, Rau - Pithampur Rd, Opposite Indian Institute of Management, Rau, Indore, Madhya Pradesh 453331 Student,4th Semester Dept. of Computer Science & Engineering, Indore Institute of Science & Technology, Madhya Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Wireless Sensor Network (WSN) plays a vital role in emerging sensing technology. Theyareused invariousfields such as military operations, healthcare applications, traffic control, and home applications. Even sensor can monitor, pressure, humidity, noise level, temperature, soil makeup and other properties. Wireless Sensor Network can be of consist of different types of sensors like thermal, visual, infrared, acoustic and radar. Wireless Sensor Network (WSN) is broadcast nature of the wireless communicationsoitbecomes easy for the attacker to send false data or false information to compromise the entire network due to which there are high chances that causes problem in making decision. Here the solution proposed is MAC (Message Authentication Code), Authentication is necessary for many administrative tasks informally; data authenticationallowsareceivertoverifythat the data really is sent by the claimed sender. If the message is from claimed sender then the message or information is accepted or if the message is from not from theclaimedsender then the message or information is not accepted. Key Words: Wireless Sensor Network (WSN), MAC (Message Authentication Code), Attacker, Security 1. INTRODUCTION The Wireless Sensor Network (WSN)consistsofsensorsthat are tiny in size and have the capability of sensing things and communicating with other devices,overa specific area.They are low cost solutions for variety of real world applications. Wireless Sensor Network (WSN) sensors are small in size and low power. Also the main problem of the sensoristhatit has very low storage, so whatever algorithm or program is written for securing the network, it has to very small and efficient in order to work properly. WirelessSensorNetwork (WSN) is broadcast in nature means the network can be compromised by the attacker. The attacks can target any node, this can lead to leak secret information andinterfering message which ultimately violates security. Therefore authenticity is a mandatory service for securing Wireless Sensor Network (WSN), because message modification or message falsification is problems that need to be solved. Architecture of Wireless Sensor Network (WSN): Wireless Sensor Network (WSN) consists of following components: 1. Sensor Node: - It is low powered, small in size and has low storage. It includes radio transceiver, an antenna, a microcontroller and for energya battery. 2. Gateway: - It enables communication betweenhost application and field devices. 3. Network Manager: - It is responsible for configuration of the network scheduling. Fig 1. Architecture of WSN Advantages of Wireless Sensor Network (WSN): ๏‚ท New nodes or devices can be added at any time. ๏‚ท All nodes can be accessed through centralized monitoring system. ๏‚ท Since it is wireless in nature so it is cost efficient as it does not require wires and cables. ๏‚ท They can be used in variety of domains such as military, healthcare, agriculture, mines etc. Disadvantages of Wireless Sensor Network (WSN): ๏‚ท Sensors have low storage and low powered battery. ๏‚ท It cannot be used forhighspeedcommunicationdue to low bandwidth. ๏‚ท It is wireless in nature, so it can be hacked easily by the attacker. ๏‚ท It is expensive to build such network.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 496 Applications of Wireless Sensor Network (WSN): ๏‚ท It can be used in environmental applications like to track movement of birds,small animals,andinsects. ๏‚ท It can be used in military applications. ๏‚ท It can be used in health applications like to monitor a patient or monitor internal process of small animals. ๏‚ท It can be used in agriculture applications like to monitor temperature, measuring water supply and so on. Fig 2. Diagram of WSN Applications 2. RELATED STUDY There are several proposals for implementing authenticity services on Wireless Sensor Network (WSN), the most are based on symmetric techniques and only a few ones involve public key cryptographyindirectly.Symmetriccryptography offers low complexity in algorithms and small data pieces to manipulate and store. However scalability and flexibility are the drawbacks in these techniques. This approach has been explored in several proposals for implement security services using symmetric encryption, keyed and un-keyed hash functions and pre-distribution key techniques as proposed in the work of Du and Li among others. Oliveira et al. proposed in a key distribution method that allows to two nodes to agree a common key. Oliveiraโ€™s approach explodes the use of IBC to accomplish the key exchange. Survey: - Many researchers have proposed the mechanism attacks. The research in field of security in Wireless Sensor Network (WSN) issues, challenges and solution which have been taken help are as follows: Table 1. Researchers/Authors with their methods and details. Authors/Researchers Description Prachi Pathak and Amzad Quaz Proposed directional antenna, cryptography and key management protocol. Classification of attacks in WSN. Moises Salinas Rosales, Gina Gallegos Garcia, Gonzalo Duchen Sanchez Moises Salinas Rosales, Gina Gallegos Garcia, Gonzalo Duchen Sanchez Proposed security solution through cryptography and MAC. Prashant Shukla Proposed securityissuesand challenges in WSN and provided the defense and counteraction research solution to the security. Swati Bartariya and Ashutosh Rastogi Identify the security threats and attacks in WSN with security solutions. A.K. Nuristani and Jawahar Thakur About security, challenges, solutions like MAC, key management, encryption. Amit Kumar Gautam,Rakesh Kumar Description on various trust management, authentication and key management schemes. Jian Wang Solving security problem by key management scheme. 3. PROPOSED SOLUTION To know that the message or information is coming from actual sender we are using Message Authentication Code (MAC) in the Wireless Sensor Network (WSN).HereMessage Authentication Code (MAC) contains cryptographicprocess. With the help of symmetric key the cryptographic process is implemented for sender andreceiver.Wehaveimplemented in python language since it will take less memory as sensors consist of less and limited memory. In the block diagram Fig 3, sender wants to send message and sender apply Symmetric Key (K) and generates MAC value say H1 then the message and MAC value H1 alongwith the message is received by the receiver. Now receiver will also calculates its MAC value say H2 with the same Symmetric Key (K) used by the sender. Then there will be comparison is done between MAC values H1 and H2. If MAC value H1 and MAC value H2 are same that means there is no
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 497 change in the message by the attacker or hacker and we can accept that message. But if MAC value H1 and MAC value H2 are not same that means the message has been changed by the attacker or hacker and we cannot accept thatmessage as the message is corrupted that can lead to misleading in taking important decisions. Fig 3. Implementation Diagram Proposed Program import hashlib import base64 #Sender and Receiver share a secret key secret_key = "secret key".encode() #Sender generates MAC message = "Information from sender!!!".encode() sha256 = hashlib.sha256() sha256.update(secret_key) sha256.update(message) h1mac = sha256.digest() #Receiver receives and validates MAC sha256 = hashlib.sha256() sha256.update(secret_key) sha256.update(message) h2mac = sha256.digest() if (h1mac==h2mac): print("---Message and MAC from Sender---") print(message,'***', h1mac) print("---Message and MAC from Receiver---") print(message,'***', h2mac) else: print("Network Compromised") Table 2. Implemented Modules S. No. MODULE DESCRIPTION 1. hashlib It is an interface for hashing messages easily. This contains numerous methods which will handle hashing any raw message in an encrypted format. The core purposeofthis module is to use a hash function on a string, and encrypt it so that it is very difficulttodecrypt it. 2. base64 In Python the base64 module is used to encode and decode data. First, the strings are converted into byte-like objects and then encoded using the base64 module. Table 3. Implemented Methods S.No. MODULE DESCRIPTION 1. encode The encode() method encodes the string, using the specified encoding. 2. update Update the hmac object with msg. 3. digest This method is used to return the digested data which is passed through the update method. 4. CONCLUSIONS This paper presents details study on the securityofWireless Sensor Network (WSN). Firstly, introducing about Wireless Sensor Network (WSN) in detail and then discussed about the security issue. Security is an important requirement
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 09 | Sep 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 498 because the application of Wireless Sensor Network (WSN) will be deeper and wider like in healthcare and military purposes. Wireless Sensor Network (WSN) product in industry will not get acceptance unless there is a full proof security to the network. There are limitations in sensorslike low power energy and low space storage. To overcome the problem of security usually keeping in mind about the low storage, we provided Message Authentication Code (MAC) use, because of this it is guaranteed that the message is to from authenticated to the source. It takes less computing load, high security, less computing load, efficient utilization of resources such as memory, bandwidth, and power. REFERENCES [1] Jeevan Kumar and Sushanta Mahanty, Security in wireless network, IJERT, 2013 [2] Nidhi Chandra and Saima Maqbool, Categorized security threats in WSN, International Journal of Computer Applications, February 2013 [3] Prachi Pathak and Amzad Quaz, Issues, Challenges and Solution in WSN, International Journal of Electrical, 2017 [4] Ankur Sirohi and Dr. Amit K. Agarwal, Security in (WSN), 2020 [5] Zhang Huanan, Xing Suping and Wang Jiannan, Security and application of (WSN), ICICT-2020 [6] Riaz Shaik and Shaik Shakeed Ahamad, Security Attacks and Challenges of (WSN), International Journal of Engineering & Technology, 2018 [7] Saqib Ali, Taiseera Al-Balushi, Omar Khadeer Hussain, Improving The Resilience of WSNs AgainstSecurityThreats, IJT, 2018 [8] Selcuk Uluagac, Christopher P. Lee and John A. Copeland,Designing Secure Protocols for WSNs [9] Fei Hu, jim Ziobro, Jason Tillett and Neeraj K. Sharma, Secure (WSN):Problems and Solutions, IEEE [10] Hyung-Woo Lee and Choong Seon Hong, Security in (WSN):Issues and Challenges [11] Preetkamal Singh, Dr. OP Gupta and Sita Saini, A Brief Study of WSN, Advances in Computational Sciences and Technology, 2017 [12] Shengjun Xie, Xiang Wang and Hua Shang, Security Analysis on WSN in the Data Center for Energy Internet of Things, 2020 [13] Vishal Rathod and Mrudang Mehta, Security in WSN, Ganpat University Journal of Engineering & Technology, 2011 [14] A.K. Nuristani and Jawahar Thakur, Security Issues and Comparative Analysis of Security Protocols inWSN, JCSE, 2018 [15] MOISES SALINAS ROSALES, GINA GALLEGOS GARCIA, GONZALO DUCHEN SANCHEZ, Efficient Message Authentication Protocol for WSN, Issue 6, Volume 8, June 2009 [16] M. B. Apsara, P. Dayananda, C. N. Sowmyarani, A Review on Secure Group Key Management Schemes for Data Gathering in WirelessSensorNetworks,Vol.10,No. 1, 2020 [17] Amit Kumar Gautam, Rakesh Kumar, A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks, 09 January 2021 [18] Oladayo Olufemi Olakanmi and Adedamola Dada, Wireless Sensor Networks(WSNs):SecurityandPrivacy Issues and Solutions, Submitted: August 28th, 2018 Reviewed: February 6th, 2019Published: March 29th, 2020 [19] Prashant Shukla, Security Issues, Challenges and Solutions for Wireless Sensor networks [20] Mauricio Tellez Nava, Improving the security of WSN, 2016 [21] Jaydip Sen, Security in Wireless Sensor Networks [22] M.B. Apsara, P.Dayananda and C.N.Sowyarani, A Review on Secure Group Key Management Schemes for Data Gathering in WSN, Vol. 10, No. 1, 2020 [23] Jian Wang, Secured Communications in Wireless Sensor Networks [24] Swati Bartariya and Ashutosh Rastogi, Securtiy in Wireless Sensor Networks: Attacks and Solutions, IJARCCE