M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014
SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
secure communication refers to exchange of information in encrypted form, so that adversary or unauthorized party could not access the sensitive information. In Wireless Sensor Networks (WSN) due to resource limitations security and privacy becomes very key issue as each of sensor nodes collects sensitive information and transmit over the network. Since Sensor networks does not support the traditional security mechanisms we have concentrated on data access control more precisely in order to avoid data leakage or unauthorized party. Here we are discussing the issue of data access control in WSN with help of Key-lock match method to prevent unauthorized access to data reports. Along with the real time implementation we are detecting replay attack considering some traditional cryptographic methods. Results show that we achieve higher security than the existing methods.
Keywords: Sensor Nodes, Replay attack, Buffer filter
Edition: Volume 3 Issue 7, July 2014
Pages: 1752 - 1755
How to Cite this Article?
Uttarkar Amit Ratikant, Hingoliwala H. A., "SNPDAC: Secure Network Protocol with Data Access Controlling in WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141358, Volume 3 Issue 7, July 2014, 1752 - 1755
25 PDF Views | 26 PDF Downloads
Similar Articles with Keyword 'Sensor Nodes'
Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks
Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal
Coverage Hole Detection in Wireless Sensor Networks
Rakesh Kumar, Sakshi Dhingra
Analysis of Fault Tolerance using Clustering Scheme for Wireless Sensor Network
Swati P. Wankhede, A. N.Thakare, M. S. Nimbarte
A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks
Shishir Sharma, Gajendra Singh Chandel
Similar Articles with Keyword 'Replay attack'
Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos
Shyama V S, Mary Linda P A
Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control
Survey Paper on User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
Afsha Pathan, M. D. Ingle
Jamming Attacks Detection in Time-Critical Wireless Applications
Prajakta V. Pandhare, Jayant Adhikari
Host Identity Protocol for End-to-End Security in IoT
Huda Mulani, Aruna Gawade