I. INTRODUCTION
Wireless Sensor Network consists of highly distributed
Autonomous sensors nodes to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a receiver (destination) [1] [7].
A sensor node consist of a radio transceiver with internal antenna or connected to external antenna, a microcontroller and electronic circuits for interfacing with the sensors and energy source such as battery[1][7].
A. Topologies:
Topologies used in Wireless Sensor Network are Mesh, Star, Ring, Tree, and Bus, Fully connected.
Mesh Network.
B. Characteristics:
• Power consumption constrains for nodes using batteries or energy harvesting
• Ability to cope with node failures
• Mobility of nodes
• Communication failures
• Heterogeneity of nodes
• Scalability to large scale of deployment
C. Application:
• Military Applications.
• Environmental Applications.
• Health Applications.
• Home and Other Commercial Applications.
Military Applications:
• Monitoring friendly forces, equipment, and ammunition • Reconnaissance of opposing and terrain
• Battle Field surveillance and Battle damage as-sessment
• Nuclear, Biological and chemical attack detection
Example:
Area Monitoring: Wireless sensor network nodes are deployed in a particular area to sense the performance of an area.
Environmental Applications:
• Forest fire detection
• Bio-complexity mapping of the environment
• Flood detection
Example:
Forest Fire Detection: WSN nodes are deployed in forest whenever there is fire in the forest detect the fire and control the fire in the forest.
Air Pollution monitoring: To monitor the pollutants gas in the atmosphere in...
... middle of paper ...
...ymmetric Cryptography mechanism means sender and receiver shared a secret key to encrypt and decrypt the message.
AES is a better algorithm in symmetric cryptography.
Asymmetric cryptography: Asymmetric Cryptography techniques means sender have public key but receiver need private key to access the encryption key.
Elliptic Curve Cryptography is a better technique.
Hybrid Cryptographic techniques for security against wireless sensor network:
Hybrid Cryptographic techniques include symmetric and asymmetric cryptography algorithms such as AES is better symmetric cryptography technique and ECC (Elliptic Curve Cryptography) is better asymmetric cryptographic technique for WSN.
VIII.CONCLUSION
Hybrid cryptography technique used to encrypt the data on the network and the other security techniques to secure the network against the network attacks. Network can be secure
Encryption is the most powerful way to secure information by protecting it in the occurrence of theft, loss, or unauthorized access. It scrambles your data by requiring the receiver to have a secret key or password which would allow them to decrypt it. Web browsers indicate encrypted security techniques by showing a “lock” icon in the status bar. Webpages for online shopping will have either “http” at their beginning of the web address or a “lock” icon on the page. Email services should be protected by antivirus software. These
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
Asymmetric Key Encryption methods are DSA, Diffie Hellman, RSA, Elliptic Curve and DSA. Asymmetric Encryption
Large amounts of data streams are generated in resource-constrained environments. Sensor networks represent a typical example. These devices have short life batteries. The design of techniques that are energy efficient is a crucial issue given that sending all the generated stream to a central site is energy inefficient in addition to its lack of scalability problem.
The rapid progress of embedded MEMS (micro-sensing technologies) and wireless communication has made wireless sensor networks possible. Such an environment may have many wireless nodes which are inexpensive; each node is capable of collecting, storing and processing environmental data, and communicating with neighboring nodes. These sensors are connected with wires in the past but tod...
...work Security Article). With this given information in the essay, is a great start to learn how to keep your network secure. This is only a small part of the prevention of infiltration of your network and computer. If one desires to learn more, go above and beyond and continue to learn on how to keep your network secure.
Wireless local area networks (WLANs) have the potential to improve the flexibility, productivity, and the quality of work life of an enterprise (Sage Research Staff, 2001). Berean Institute is a typical two year college with about a staff of sixty eight employees and 250 students per semester. Berean teaches cosmetology, barbering and the latest software and hardware technology, which is located in Philadelphia, Pennsylvania. Berean currently has two locations in the Philadelphia area and using a Local Area Network (LAN).
In this topology, all nodes are connected to a central device, usually a hub or a switch. Each connected device has a dedicated, point-to-point connection between the device and the hub. The star network topology is by far the most widely implemented topology in use today.
cultivation control and precise irrigation. IOT also brings great convenience to forestry, especially in the forest identification, wood tracking management and so on.
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
The Internet of Things (IoT) is the network of physical objects accessed through the Internet. The Network of interconnected objects harvests information from the environment (sensing) and interacts with the physical world (actuation/command/control), uses existing Internet standards to provide services for information transfer, analytics, applications and communications (Jiong et al. 2012).
This research paper is on a very important topic (Wireless Communication Security). The security of wireless communication is becoming more critical in today’s society and its future as well. While the technology is rapidly growing, businesses and people are eager to embrace the technology and use it to become more competitive in the business world and even more convenient with daily use in the personal setting. The question concerning this fast growing technology will be the issue of security and the integrity of the data being transferred over these systems.
...uter Reseller News PG). This is accomplished by assigning each user both a private and a public key (Computer Reseller News PG). While the public key is published so that all can access it and use it to send information to its owner, the private key is kept secret and used by the receiver to decrypt the information which was sent (Computer Reseller News PG).
...vantage of the overall network design and implement usable subnets with virtual local area networks. Use encryption and encapsulation to secure communications of public segments to enable extranets and cross-Internet company traffic. Use items such as intrusion detection systems and firewalls to keep unauthorized users out and monitor activity. Taken together, these pieces can make a secure network that is efficient, manageable, and effective.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: