A Secure Framework For Wireless Sensor Network
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
A wireless sensor network (WSN) is the network of many
newlineminiature devices that have capability to sense the phenomenon being
newlinemonitored and communicate the raw data to the base station. WSNs can
newlinebe deployed in the field of interest with backbone network infrastructure
newlineor non-infrastructure topology. WSNs are the backbone for
newlinedevelopments in Internet of Things (IoT) applications. WSN systems
newlinecan be broadly classified as static networks and mobile or dynamic
newlinenetworks. Static WSNs have the sensor nodes placed in predefined
newlinepositions. Dynamic or Mobile WSNs (MWSNs) have mobile nodes or
newlinemobile sinks or both mobile and are suitable for applications that require
newlinemonitoring the moving objects with sensor nodes mounted on them such
newlineas animals or humans. Design, development and implementation of
newlinemechanisms for sensor node authentication, secure exchange of route
newlineinformation and data in MWSNs has several challenges due to dynamic
newlinenetwork attributes and constrained energy availability. The research
newlinechallenges for MWSN namely node authentication, black hole attack
newline(DoS attack), key management are addressed in this work.
newlineThe major contribution of the thesis is design, development
newlineand implementation of sensor node authentication protocol and two
newlinesecurity mechanisms over routing in the network namely Lightweight
newlineSecurity Scheme for Cluster-based WSN (LSSCW) and Enhanced
newlineDetection and Prevention Mechanism for Black-hole-attack
newline(EDPMBA). The sensor node authentication protocol for clustered
newlineMWSN authenticates the nodes when they move across the clusters. The
newlinex
newlinenovelty of the work is it minimizes the re-authentication of the sensor
newlinenodes till the time the node does not leave the cluster. The results show
newlinethat the authentication protocol developed exhibits less communication
newlineoverheads, improved energy efficiency and re-authentication latency.
newlineLSSCW scheme ensures end-to-end data security between source and
newlinedestination. Security analysis of LSSCW scheme with respect to
newlineauthentication, confidentiality and integrity is presented.