Open Access Open Access  Restricted Access Subscription Access

Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime Enhancement


Affiliations
1 S.I.E.T, Tumkur, India
2 A.I.T, Tumkur, India
3 Dept of CSE, C.I.T, Gubbi, Tumkur, India
 

Remote sensor systems are self sorted out, self-governing, programmed revelation of administrations, exceedingly versatile, solid, Infrastructure less administration. Predominantly material in the field of debacle, social insurance. Secure spread of code updates in Wireless Sensor Network is testing assignment. Programming refreshes in Wireless Sensor Networks is accepting huge consideration as of late as it expands the lifetime of the system. Because of the expansive number of hubs, it is illogical to refresh the product physically on account of the size of such arrangements and the physical unavailability of certain sensor hubs. For certain WSN applications, securing the procedure of remote reconstructing is fundamental. For instance, code refreshes in military applications must be confirmed to maintain a strategic distance from the download of malignant code into conveyed sensor hubs. Also, applications that require protection and obscurity ought not concede code refreshes that can reinvent the WSN to snoop on focuses without authorization. Given the presumption that more bytes transmitted means in a roundabout way more vitality squandered in the spread, vitality proficiency is accomplished by lessening the rate of overhead hash bytes per page.

This work proposes two security systems for validation of secure spread. The protected dispersal manage safely sharing information between neighboring hubs, which manages two security systems: honesty and privacy. The point is to accomplish exchange off between the security and vitality.


Keywords

Authentication, Hash Function, Cryptography, Security, Wireless Sensor Networks (WSN).
User
Notifications
Font Size

  • S. Kulkarni, and L. Wang, “MNP: Multihop network reprogramming service for sensor networks”, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus Ohio USA, pp. 7-16, Jun 2005.
  • T. Stathopoulos, J. Heidemann, and D. Estrin, "A remote code update mechanism for wireless sensor networks", CENS Technical Report 30, University of California UCLA, 2003.
  • J. Hui, and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale”, Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore MD USA, pp. 81-94, Nov 2004.
  • M. Krasniewski, R. Panta, S. Bagchi, C. Yang, and W. Chappell, “Energy-efficient on-demand reprogramming of large-scale sensor networks”, ACM Transactions on Sensor Network, 4(1):1-38, 2008.
  • V. Naik, A. Arora, P. Sinha, and H. Zhang, “Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices”, Proceedings of the 26th IEEE International Real-Time Systems Symposium, Miami Florida USA, pp. 277-286, Dec 2005.
  • R. Panta, I. Khalil, and S. Bagchi, "Stream: Low overhead wireless reprogramming for sensor networks", 26th IEEE International Conference on Computer Communications, pp. 928-936, 2007.
  • Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj, ”Authentication Schemes for Wireless Sensor Networks ”Proceedings of 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16 April 2014.
  • Carlos F. Caloca de la Parra, J. Antonio GarciaMacias,” A Protocol for Secure and Energy-Aware Reprogramming in WSN”, Proceedings of 2009 International Conference on wireless communications and mobile computing connecting the world wirelessly.
  • Haider M. AI-Mashhadi, Hala B. Abdul-Wahab , Iraq Rehab F. Hassan ,” Secure and Time Efficient Hash-based Message Authentication Algorithm for Wireless Sensor Networks” Proceedings of IEEE,978-1-4799-5627-2/14, 2014.
  • I. S. Alshawi, L. Van, W. Pan and B. Luo, "Lifetime enhancement in wireless sensor networks using fuzzy approach and A-star algorithm," IEEE Sensors J., vol. 12, no. 10, pp. 3010-3018, Oct. 2012.
  • Trevatha.l., Ghodosi H., and Myers T., "Efficient batch authentication for hierarchical wireless sensor networks," in IEEE ISSNIP, pp. 217-222, 2011.

Abstract Views: 162

PDF Views: 6




  • Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime Enhancement

Abstract Views: 162  |  PDF Views: 6

Authors

N. J. Mallikarjunaswamy
S.I.E.T, Tumkur, India
T. R. Latha Yadav
A.I.T, Tumkur, India
Keshava Prasanna
Dept of CSE, C.I.T, Gubbi, Tumkur, India

Abstract


Remote sensor systems are self sorted out, self-governing, programmed revelation of administrations, exceedingly versatile, solid, Infrastructure less administration. Predominantly material in the field of debacle, social insurance. Secure spread of code updates in Wireless Sensor Network is testing assignment. Programming refreshes in Wireless Sensor Networks is accepting huge consideration as of late as it expands the lifetime of the system. Because of the expansive number of hubs, it is illogical to refresh the product physically on account of the size of such arrangements and the physical unavailability of certain sensor hubs. For certain WSN applications, securing the procedure of remote reconstructing is fundamental. For instance, code refreshes in military applications must be confirmed to maintain a strategic distance from the download of malignant code into conveyed sensor hubs. Also, applications that require protection and obscurity ought not concede code refreshes that can reinvent the WSN to snoop on focuses without authorization. Given the presumption that more bytes transmitted means in a roundabout way more vitality squandered in the spread, vitality proficiency is accomplished by lessening the rate of overhead hash bytes per page.

This work proposes two security systems for validation of secure spread. The protected dispersal manage safely sharing information between neighboring hubs, which manages two security systems: honesty and privacy. The point is to accomplish exchange off between the security and vitality.


Keywords


Authentication, Hash Function, Cryptography, Security, Wireless Sensor Networks (WSN).

References