N Tier Modeling of Robust Key Management for Secure Data Aggregation in Wireless Sensor Network
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The recent advancement in the domain of wireless communication and networking has led to
newlinea situation where the exponential growth of wireless sensor devices and their connectivity to
newlinethe internet is in use. Thereby, increasing demand for data exchange in this open wireless
newlinesensor network channel attributes make information transmission, resource constrained and
newlineat the same time make it vulnerable to different security attacks.
newlineThe existing solutions towards security aspects in WSN are minimal. With the gaining
newlinepopularity of WSN based applications, it is critical to study and build security related models,
newlinearchitecture and algorithms. The study explores the existing security loopholes in the
newlineconventional routing and network operations especially for a large scale WSN that are more
newlinevulnerable to the intruders or attackers. The critical investigational study reveals that the
newlinetraditional security approaches for WSN having various design challenges from the
newlineviewpoint of computational complexities. In the large scale WSN, the traditional security
newlinesolutions degrade the network performance and QoS. The approach of lightweight
newlinecryptographic algorithms is gaining popularity to meet the futuristic security and QoS goals
newlinefor WSN based Internet-of-Things (IoT) applications. Hence, the prime purpose of this
newlineresearch study is to formulate a robust security solution which can ensure a higher degree of
newlinedata privacy concerning integrity, authentication, and validation and at the same time do not
newlineaffect the communication performance from the QoS aspects.
newlineFinally, the study frames its design objective, where addressing this problem it comes
newlineup with two different novel solutions. Firstly, a cost-effective solution and its conceptual
newlinedesign and modeling namely Request Authentication using Shared Key (RASK), followed by
newlineanother approach namely Framework for Secure Data Aggregation (FSDA). However, the
newlineoverall thesis presented in a way where initially it discusses the preliminary and background
newlinestudy associated wi