The Enhanced ECC Approach to Secure Code Dissemination in Wireless Sensor Network
نویسندگان
چکیده
Wireless Sensor Networks plays important role in our life so they need to be secured. In this paper we will first give introduction of basics of wireless sensor network and code dissemination technique. We will discuss the impact of reprogramming on WSN in parallel. we will introduce technique called Enhanced ECC to make WSN energy efficient.
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملReliable And Efficient Distributed Code Dissemination In Wireless Sensor Networks
In Wireless Sensor Networks ,Code Dissemination is a process of Propagating new code images or commands in the network. Since the WSN are mostly deployed in the military and hostile environments secure code dissemination is needed. Mostly code dissemination protocols are based on two approaches. First based on the centralized approach in which only the base station has the authority to initiate...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کامل