Research Article

Article:Security in Wireless Sensor Networks using Frequency Hopping

by  Gaurav Sharma, Suman Bala, A. K. Verma, Tej Singh
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Issue 6
Published: December 2010
Authors: Gaurav Sharma, Suman Bala, A. K. Verma, Tej Singh
10.5120/1686-2247
PDF

Gaurav Sharma, Suman Bala, A. K. Verma, Tej Singh . Article:Security in Wireless Sensor Networks using Frequency Hopping. International Journal of Computer Applications. 12, 6 (December 2010), 1-5. DOI=10.5120/1686-2247

                        @article{ 10.5120/1686-2247,
                        author  = { Gaurav Sharma,Suman Bala,A. K. Verma,Tej Singh },
                        title   = { Article:Security in Wireless Sensor Networks using Frequency Hopping },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 12 },
                        number  = { 6 },
                        pages   = { 1-5 },
                        doi     = { 10.5120/1686-2247 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Gaurav Sharma
                        %A Suman Bala
                        %A A. K. Verma
                        %A Tej Singh
                        %T Article:Security in Wireless Sensor Networks using Frequency Hopping%T 
                        %J International Journal of Computer Applications
                        %V 12
                        %N 6
                        %P 1-5
                        %R 10.5120/1686-2247
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. These networks are vulnerable to internal and external attacks due to the lack of tamper-resistant packaging and the insecure nature of wireless communication channels. Since most of the existing routing protocols are application specific and hence do not satisfy the security constraints of wireless sensor networks. Whenever any device comes within the frequency range can get the access to the transmitting data and may affect the transmission. In this paper, we simulated the concept of frequency hopping and proved it a better approach to provide security in WSN..

References
  • Ad hoc on-demand distance vector (AODV) routing. Online Available: http://www.ietf.org/rfc/rfc3561.txt
  • Bisdikian, C. 2001. An overview of the Bluetooth Wireless technology. IEEE Communication Magazine, vol. 39.
  • Bruce Barnett. AWK – A Tutorial and Introduction. http://www.grymoire.com/Unix/Awk.html
  • Carman, D., Krus, P., and Matt, B., 2000. Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs.
  • Crow, B., Widjaja, I., Kim, J., and Sakai, P. 1997. IEEE 802.11 Wireless Local Area Networks. IEEE Communication Magazine, Vol. 35.
  • Ganesan, R., Govindan, S., Shenker, and Estrin, D., 2001. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review, vol. 4.
  • IEEE 802.15.4 WPAN-LR Task Group Website: http://www.ieee802.org/15/pub/TG4.html
  • Jones, K., Waada, A., Olaniu, S., Wison, L., and Eltoweissy, M. 2003. Towards a new paradigm for Securing Wireless Sensor Networks. New Security Paradigms workshop 2003.
  • Karlof, C., and Wagner, D., 2003. Secure routing in wireless sensor networks: attacks and countermeasures. University of California at Berkeley, USA, Ad Hoc Networks 1 (2003).
  • Koubaa,A., Mario, A., Bilel, N., SONG, Y. Improving the IEEE 802.15.4 Slotted CSMA-CA MAC for Time-Critical Events in Wireless Sensor Network.
  • Marc Greis. Ns Tutorial. http://www.isi.edu/nsnam/ns/tutorial/index.html
  • Roosta, T., Shieh, S. and Sastry, S., 2006. Taxonomy of Security Attacks in Sensor Networks and Countermeasures. Berkeley, California, University Press.
  • Royer, E., and Perkins, C. An Implementation of the AODV Routing Protocols. http://reference.kfupm.edu.sa/content/i/m/an_implementation_study_of_the_aodv_rout_2328699.pdf
  • Sastry, N., and Wagner, D., 2004. Security considerations for ieee 802.15.4 networks. In Proceedings of ACM workshop on Wireless security.
  • TCL Tutorial. http://www.tcl.tk/man/tcl8.5/tutorial/tcltutorial.html
  • Torrieri, D., 1989. Fundamental limitations on repeater jamming of frequency-hopping communications. IEEE Journal on Selected Areas in Communications, vol. 7, no. 4.
  • Tovmark, K., 2002. Frequency Hopping Systems (Rev. 1.0). Chipcon Application Note AN014. http://electronix.ru/forum/index.php?act=Attach&type=post&id=3712
  • Tracegraph http://www.tracegraph.com/download.html
  • Vanninen, T., Tuomivaara, and H., Huovinen, J., 2008. A Demonstration of Frequency Hopping Ad Hoc and Sensor Network Synchronization Method on WARP Boards. WinTech’08, ACM 978-1-60558-187-3/08/09.
  • Zheng, J., and Lee, M. 2006. A comprehensive performance study of IEEE 802.15.4 – Sensor Network Operations. Wiley Interscience. IEEE Press Chapter 4. 218-237.
  • Zyren, J., Godfrey T., and Eaton, D. Does frequency hopping enhance security? http://www.packetnexus.com/docs/20010419_frequencyHopping.pdf
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Wireless Sensor Networks Security Frequency Hopping

Powered by PhDFocusTM