A Survey on Secure Mechanism for Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Information Technology | India | Volume 3 Issue 11, November 2014

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

As Wireless Sensor Networks are proceeding towards wide-spread deployment, security issues become a central issue. Assuring the security of communication and access control in Wireless Sensor Networks (WSNs) has huge importance. So far, huge research has focused on making Wireless Sensor Networks feasible and useful, and has not concentrated on security. A security technique, MoteSec-Aware, is presented based on the network layer for WSNs with concentrate on secure network protocol and data access control. For identifying the replay and jamming attacks focused around the symmetric key cryptography utilizing AES as a part of OCB mode, a Virtual Counter Manager (VCM) with a synchronized incremental counter is introduced in the secure network protocol of MoteSec-Aware. The Key-Lock Matching (KLM) system to stop unauthorized access is investigated for access control. MoteSec-Aware is built for the TelosB model sensor platform running TinyOS 1.1.15, and conduct field tests and TOSSIM-based simulations to assess the performance of MoteSec-Aware. The results show that MoteSec-Aware expends substantially less energy, yet accomplishes higher security levels than a number of state-of-the-art techniques.

Keywords: Wireless Sensor Networks, Security, Replay attacks, Jamming attacks

Edition: Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

Share this Article

How to Cite this Article?

Tabbasum Sajjan Magdum, Y.B.Gurav, "A Survey on Secure Mechanism for Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141614, Volume 3 Issue 11, November 2014, 2849 - 2851

97 PDF Views | 81 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Wireless Sensor Networks'

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 1458 - 1460

A Survey On Data Aggregation Techniques to Improve the Energy Efficiency in Wireless Sensor Networks

Snehal S Lonare, A S Hiwale

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2422 - 2427

Secure Data Transmission with Hierarchical Clustering

Rahul Raj, J. Godwin Ponsam

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1202 - 1204

A Survey on ?Energy Efficient MAC Protocols with Differentiation in Traffic for Wireless Sensor Networks?

Pallavi Meshram, M. V. Nimbalkar

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2556 - 2562

Wireless Sensor Networks: An Overview from an Optimization Perspective

Haroon Shoukat Ali, NoorAzian Mohamad Ali

Share this Article

Similar Articles with Keyword 'Security'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Similar Articles with Keyword 'Jamming attacks'

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1246 - 1249

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic

P. Sudha, K. Durairaj

Share this Article
Top