International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

secure communication refers to exchange of information in encrypted form, so that adversary or unauthorized party could not access the sensitive information. In Wireless Sensor Networks (WSN) due to resource limitations security and privacy becomes very key issue as each of sensor nodes collects sensitive information and transmit over the network. Since Sensor networks does not support the traditional security mechanisms we have concentrated on data access control more precisely in order to avoid data leakage or unauthorized party. Here we are discussing the issue of data access control in WSN with help of Key-lock match method to prevent unauthorized access to data reports. Along with the real time implementation we are detecting replay attack considering some traditional cryptographic methods. Results show that we achieve higher security than the existing methods.

Keywords: Sensor Nodes, Replay attack, Buffer filter

Edition: Volume 3 Issue 7, July 2014

Pages: 1752 - 1755


How to Cite this Article?

Uttarkar Amit Ratikant, Hingoliwala H. A., "SNPDAC: Secure Network Protocol with Data Access Controlling in WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141358, Volume 3 Issue 7, July 2014, 1752 - 1755

25 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Sensor Nodes'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2660 - 2664

Coverage Hole Detection in Wireless Sensor Networks

Rakesh Kumar, Sakshi Dhingra

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 782 - 786

Analysis of Fault Tolerance using Clustering Scheme for Wireless Sensor Network

Swati P. Wankhede, A. N.Thakare, M. S. Nimbarte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this article



Similar Articles with Keyword 'Replay attack'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2345 - 2351

Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1297 - 1299

Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control

Jessy Cherian

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2024 - 2027

Survey Paper on User Anonymous Authentication Scheme for Decentralized Access Control in Clouds

Afsha Pathan, M. D. Ingle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 379 - 382

Jamming Attacks Detection in Time-Critical Wireless Applications

Prajakta V. Pandhare, Jayant Adhikari

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1316 - 1319

Host Identity Protocol for End-to-End Security in IoT

Huda Mulani, Aruna Gawade

Share this article
Top