Securing Wireless Sensor Network using Intelligent Techniques

نویسندگان

  • K. Priyadharshini
  • G. Hemalatha
  • K. Selvamani
چکیده

In wireless sensor networks (WSNs), the sensor nodes transmit critical information over the network. Therefore security services such as authentication and pair wise key establishment between sensor nodes and mobile sinks are important. However, the problem of authentication and pair wise key establishment in sensor networks with mobile sinks is still a critical problem in the face of mobile sink replication attacks. In the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes. This makes it possible for an attacker to take control over the entire network. Thereby deploying a replicated mobile sink, preloaded with some compromised keys to authenticate and initiate data communication with any sensor node. To address this issue a general framework needs to be developed that permits the use of any pair wise key pre distribution scheme which requires two separate key pools one for the mobile sink to access the network and other for the pair wise key establishment between the sensors. Moreover, to detect such mobile sinks and replication attacks an intelligent agent is deployed at every level in the network. The agents play a major role and perform with the idea of knowledge base and rule manager.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...

متن کامل

A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks

Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Intelligent and Online Evaluation of Diabetes using Wireless Sensor Networks and Support Vector Machines Algorithm

Objective: International Diabetes Organization estimates that there are 285 million people worldwide who suffer from diabetes, and this figure is expected to increase to 450 million in next 20 years. According to statistics issued by the World Health Organization, diabetes is considered among ten leading causes of death in world and its prevalence in the population is growing.This paper deals w...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013