Wireless Sensor Network Security in Military Application using Unmanned Vehicle

نویسندگان

  • Arun Madhu
  • A. Sreekumar
چکیده

Wireless Sensor Network is widely used in Military Applications like Tracking the enemy movements and force protection. Security is the major concern and very difficult to achieve due to the unattended nature, limited memory, and limited power of network. This paper is mainly intended to describe the implementation of the secure unmanned Vehicle Navigation system controlled by wireless sensor network. We used a cluster based approach to prevent the various types of attacks in military field. We propose armed and sealed mote to prevent the physical attacks. In order to avoid a single key compromise lead to the entire network compromise we have proposed a modified version of LEAP for key management. The vehicle navigation was implemented using a toy car controlled by a micaz mote inside it. The GPS unit is connected with the vehicle to determine the position and in the absence of GPS range we can use the relative position. The vehicle can directly send the messages to the nearest sink node. The vehicle is used for making the application more secure and all the costly devices needed for the application can be incorporated with the vehicle. This paper shows how we can use the unmanned vehicle navigation system in Military applications and how it is used to detect the intruders and prevents various kinds of security attacks in the military field.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Prison Perimeter Surveillance System Using WSN

Corresponding Author: Miss Shereen Ismail Department of Computer Science and Engineering, American University of Ras AlKhaimah, UAE Email: [email protected] Abstract: The aim of this paper is to introduce a prison hybrid surveillance system using two main technologies; Wireless Sensor Network (WSN) and Unmanned Aerial Vehicles (UAVs). The system consists of three tiers; Wireless Undergr...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015