Research Article

Implementing Data Security in Wireless Sensor Networkís through Location Aware Multifunctional Key Management Framework

by  V. Prema Tulasi, Prof. D. Durga Bhavani, Prof. Dr. Ch.G.V.N.Prasad
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Issue 1
Published: January 2011
Authors: V. Prema Tulasi, Prof. D. Durga Bhavani, Prof. Dr. Ch.G.V.N.Prasad
10.5120/1746-2379
PDF

V. Prema Tulasi, Prof. D. Durga Bhavani, Prof. Dr. Ch.G.V.N.Prasad . Implementing Data Security in Wireless Sensor Networkís through Location Aware Multifunctional Key Management Framework. International Journal of Computer Applications. 13, 1 (January 2011), 13-22. DOI=10.5120/1746-2379

                        @article{ 10.5120/1746-2379,
                        author  = { V. Prema Tulasi,Prof. D. Durga Bhavani,Prof. Dr. Ch.G.V.N.Prasad },
                        title   = { Implementing Data Security in Wireless Sensor Networkís through Location Aware Multifunctional Key Management Framework },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 13 },
                        number  = { 1 },
                        pages   = { 13-22 },
                        doi     = { 10.5120/1746-2379 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A V. Prema Tulasi
                        %A Prof. D. Durga Bhavani
                        %A Prof. Dr. Ch.G.V.N.Prasad
                        %T Implementing Data Security in Wireless Sensor Networkís through Location Aware Multifunctional Key Management Framework%T 
                        %J International Journal of Computer Applications
                        %V 13
                        %N 1
                        %P 13-22
                        %R 10.5120/1746-2379
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

As wireless sensor network’s (WSN’s) consists of large number of nodes which are deployed in unattended/hostile environments and are exposed to different types of attacks due to compromisation of node or group of nodes. Usually, security designs provide a hop-by-hop security paradigm and are vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption and selective forwarding, puts data availability at stake. In this paper, we overcome these vulnerabilities for large-scale static WSN’s by using Location aware multifunctional key management framework. Sensors will be deployed in some area in a grid type model and knows its position based on X and Y coordinates in the grid. Further, embed the location information of each sensor into few of its secret keys which are owned by that sensor node and location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. This framework assures both node-to-sink and node-to-node authentication along the report forwarding routes and demonstrates that this design is highly resilient against an increasing number of compromised nodes and effective in energy savings by avoiding DoS attacks.

References
  • D. Carman, P. Kruus, and B. Matt, ‚ÄúConstraints and Approaches for Distributed Sensor Network Security,‚Äù Technical Report 00-010, NAI Labs, 2000.
  • A. Wood and J. Stankovic, ‚ÄúDenial of Service in Sensor Networks,‚ÄùComputer, Oct. 2002.
  • C. Karlof and D. Wagner, ‚ÄúSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures,‚Äù Ad Hoc Networks, vol. 1, no. 2, 2003.
  • A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, ‚ÄúSPINS:Security Protocols for Sensor Networks,‚Äù Proc. MobiCom, July 2001.
  • E. Shi and A. Perrig, ‚ÄúDesigning Secure Sensor Networks,‚Äù Wireless Comm. Magazine, vol. 11, no. 6, Dec. 2004.
  • S. Capkun and J.P. Hubaux, ‚ÄúSecure Positioning in Wireless Networks,‚Äù IEEE J. Selected Areas in Comm., Feb. 2006
  • H. Chan and A. Perrig, ‚ÄúSecurity and Privacy in Sensor Networks,‚Äù Computer, pp. 103-105, Oct. 2003.
  • S. Zhu, S. Setia, S. Jajodia, and P. Ning, ‚ÄúAn Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data inSensor Networks,‚Äù Proc. IEEE Symp. Security and Privacy, May2004.
  • F. Ye, H. Luo, S. Lu, and L. Zhang, ‚ÄúStatistical En-Route Filtering of Injected False Data in Sensor Networks,‚Äù Proc. IEEE INFOCOM, Mar. 2004.
  • H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, ‚ÄúToward Resilient Security in Wireless Sensor Networks,‚Äù Proc. ACM MobiHoc, 2005.
  • L.Lazos and Poovendran,‚ÄúSerloc:SecureRange-Independent Localization for Wireless Sensor Networks,‚Äù Proc. ACM Int‚Äôl Conf.Mobile Computing and Networking (WiSe ‚Äô04), Oct. 2004.
  • W. Du, J. Deng, Y. Han, and P. Varshney, ‚ÄúA Pairwise Key Predistribution Scheme for Wireless Sensor Networks,‚Äù ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
  • kun Ren,Wenjing Lou,Yanchao Zhang.‚ÄùLEDS:Providing location Aware end to end data security in wireless sensor networks‚Äù IEEE Transactions vol.7 no.5.May.2008.
  • Steve Friedl's Unixwiz.net Tech Tips An Illustrated Guide to Cryptographic Hashes
  • Federal Information Processing Standards publications The Keyed-Hash Message Authentication Code(HMAC)
  • Network Security Essentials by William Stallings.
  • Copy right owner source institute written by paranoia.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Sensors Hop-by-Hop Sink Report Forwarding Route Selective Forwarding Attack Report Disruption Attack

Powered by PhDFocusTM