A Location-Aware Authentication for structured Network and structured Key Management Scheme for Wireless Sensor Networks

Gagandeep Kaur

A Location-Aware Authentication for structured Network and structured Key Management Scheme for Wireless Sensor Networks

Keywords : Online Social Network, Filtering technique, Expert System, User wall, keyword filtering


Abstract

As Sensor Nodes are deployed randomly in an uncontrolled environment used to collect the information and they communicate with base station using the transceiver. These are selected based on the parameters like Computation Rate, Processing Speed, Storage & Communication Range required for the network. Typically, ensuring security in wireless sensor network consists in providing confidentiality, authentication, and integrity services for the exchanged data that are mainly implemented using encryption algorithms where a number of keys need to be shared between the network elements. WSN can be sometimes insecure due to the presence of the malicious node which can destroy the network traffic. But sometimes it may be possible that certain attacker node unnecessarily sniffs the data. While data transfer from the sensor node to the cluster head or through certain intermediate relay node to the base station. There may be malicious intermediate node which read the data without permission. Even alter the data. To protect the network traffic from such kind of attackers structured key is the best way. While using structured key various performance parameters has improved compare to the base technique. There is a improvement in latency, energy dissipation and network load.

Download



Comments
No have any comment !
Leave a Comment