Related Work
The key management problem is an bigger issue in sensor field. Each and every sensor nodes are needed to transmit the node, then only the data’s are reached to base station, so each and every sensor node within a group need an keys to transmit the data. While attacker entered and also get the full access of sensor node, and ready to hack data, but they need to wait. Because the node are none of the keys at the time, transmitting time only the nodes get access of keys from the cluster head. A cluster having a variety of group in the network and each and every groups are specified using their names. All of the groups are having the number of nodes to transmit the information over the network.
The pair-wise key establishment between the sensor nodes are still more difficult to handle. Attackers are not easily handle the sensor nodes, they need to get the full access of node and also they try get the access of cluster. But the cluster get won’t allow to compromising the group and the cluster head provide the duplicated data’s, if the attacker give any kind of problem to sensor nodes.
Recent advances in wireless technology provide the security of blocking the attackers and also need to eliminate the attackers in the network. But in this paper providing the new technique to handle the attacker using an duplicated data as an backbone and also using dynamic key management in this system to providing the more security of the data’s in the wireless sensor network (WSN). So attackers are get confused to finds the original data’s. They don’t know the original data’s are safely send to the base station.
The Key activity of this paper is to avoid the data loss in the network and also providing...
... middle of paper ...
...obile Sink Replica In Wireless Sensor Network And Authenticate It With Key Distribution” (IJERT), ISSN:2278-0181, Vol. 2 Issue 6, June 2013.
[7]B.J. Culpepper and H.C. Tseng , “Sinkhole Intrusion Indicators in DSR MANETs,”Proc. First Int’l Conf. Broadband Networks (Broad-Nets ’04), pp.681-688, Oct. 2004.
[8]Y. Tirta, Z. Li, Y. Lu, and S. Bagchi, “Efficient Collection of Sensor Data in Remote Fields Using Mobile Collectors,” Proc. 13th Int’l Conf. Computer Comm. And Networks (ICCN ’04), Oct. 2004.
[9]A. Rasheed and R. Mahapatra, “An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks,” Proc. IEEE 27th Int’l Performance Computing and Comm. Conf. (IPCCC ’08), pp. 264-270, Dec. 2008.
[10]L. Lamport, “Password Authentication with Insecure Communication,” Comm. ACM, vol, 24, no. 11, pp. 770-772, Nov. 1981.
Sabu M. Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez (Eds.), Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings (Communications in Computer and Information Science) (p. 418). New York, NY: Springer Publishing.
8) Ian F. Akyildiz, Ismail H. Kasimoglu, “Ad Hoc Networks’’, Wireless sensor and actor networks: Research Challenges, Georgia Institute of Technology, USA, May-2004.
Structured P2P overlay network have tightly controlled topologies and content is placed at specified locations to efficiently solve queries. Some well-known examples are Content Addressable Network (CAN) [44], Chord [15] and Pastry [45]. Such overlays use a Distributed Hash Table (DHT) as substrate, where data objects (or values) are placed deterministically at the peers whose identifiers correspond to the data object’s unique key. In DHT-based systems, node identifiers are uniform-randomly assigned to the peers from a large space of identifiers. Similarly, unique identifiers, chosen from the same identifier space and called keys, are computed from data objects by means of a hash function. Keys are then mapped by the overlay network protocol to a unique live peer in the overlay network. The structured P2P overlay network support scalable storage and retrieval of {key,value} pairs. Given a key, operations like put(key,value) and get(key) can be invoked respectively to store and retrieve the data object corresponding to the key, which involves routing requests to the peer corresponding to the key. However, they only supports exact matching and are strongly affected by peer churn [31].
Abstract— Trusted Computing Group (TCG) is providing a great effort to provide network security at every level, that’s why the technologies of trusted computing group are spreading very rapidly and will become the most leading technologies in next few years. Always there are Threats to networks, which create need for some features to secure the network at end point admission. The flow of information must be confident and data integrity measures should also be followed. The models provided by trusted computing group provides high and powerful security features, TNC: Trusted Network Connect is a technology provided by TCG, which provides security both at hardware and software platforms. TNC is basically used for NAC (Authentication Purpose). The Architecture of NAC provides a clear background of how a network can be made secure and how to avoid unauthorized access. IEEE 802.1x is a standard which provide port based network access control and protect the network from unauthorized access. If the access register is unauthorized then access is given but access is not given when the access is unauthorized. IEEE 802.1x is basically used for authentication and authorization purpose. This paper aims to review the literature of trusted computing in context of trusted network connect and 802.1x port based authentication using NAC.
[4] W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proc. 2004 IEEE INFOCOM, pp. 586–597.
It supports the use of nested tunnels which means that multiple gateways and the tunnels can be encrypted over again.
Considering the factors such as fault tolerance, flexibility, high sensitivity and low cost of sensor networks have a exciting prospect in the present and future days in various departments with various applications and uses of its kind. There are still many more improvements to be done for the current network sensors, and many of them are currently under research and will be out soon with the best possible solutions to tackle all the possible constraints and work optimally.
A sensor node is also known as a mote (mostly in North America). This sensor node in a wireless sensor network is capable of performing some processing, gathering of sensory information and communicating with other connected nodes in the network. It must be clearly understood that a mote is a node but a node is not always a mote. Although wireless sensor nodes have existed for decades and used for applications as diverse as earthquake measurements to even warfare, the latest development of small sensor nodes dates back to the 1998 Smartdust project[1] and the NASA Sensor Webs Project[1]. One of the objectives of the Smart dust project was to create autonomous sensing and communication within a cubic millimeter of space. Though this project ended early on, it led to many more research projects. They include major research centers in Berkeley NEST [2] and CENS [2]. The researchers involved in these projects came up with the term mote to refer to a sensor node. The equivalent term in the NASA Sensor Webs Project[2] for a physical sensor node is pod, although the sensor node in a Sensor Web can be another Sensor Web itself. Physical sensor nodes have been able to increase their capability in conjunction with Moore's Law. The footprint of the chip contains more complex microcontrollers and these microcontrollers are also lower powered. Thus, for the same footprint of the node, more silicon capability can be now packed into it. Nowadays, motes or nodes focus on providing the longest wireless range upto dozens of km, with lowest energy consumption and the easiest development process for the user.
ISO/IEC 9798, Information Technology - Security Tech- niques - Entity Authentication. Part 1, General. Part 2, Mechanisms Using Encipherment Algorithms. Part 3, Mechanisms Using a Public-Key Algorithm, Int’l Orga- nization for Standarization, Geneva, 1997.
In recent years, Mobile ad hoc network is used due to increasing number of mobile devices such as mobile phones, laptops, PDA etc., An ad hoc network consists of infrastructure based ad hoc network that depends on pre-constructed infrastructure made of fixed nodes and infrastructure less ad hoc network that does not depend on pre-existing infrastructure and it is dynamically cooperate with set of independent nodes. A Mobile ad hoc network is self-organized network without infrastructure connected by wireless links. Due to de-centralized infrastructure, a node can act both as router and host. The nodes can directly communicate each other within their transmission range otherwise the multi-hop network is needed. The mobile ad hoc network is widely used in day-to-day life such as military operations where an infrastructure is unknown to the soldiers. Web services like e-mail can be used for file transfer and it also used in multimedia applications. It is also used in disaster recovery such as earthquake, tsunamis etc. In MANET, the nodes are free to move, it will change its connection to other devices frequently. An important issue in MANET is routing between two nodes, due to the changing topology of the network. The routing protocol should be secure to protocol to protect against network attacks such as Black hole attack, worm hole attack, Dos attack, grey hole attack. Mostly AODV, DSR, DSDV are prone to the attacks. Research work concentrates in the field of routing and security. MANET has attacks in all the layers. In the physical layer jamming, intercept and eavesdrop attacks may occur. In the data link layer, traffic analysis, monitoring, disruption may occur. In the network layer, wormhole, black hole, byzantin...
De Poorter, E., Troubleyn, E., Moerman, I., & Demeester, P. (2011). IDRA: A flexible system architecture for next generation wireless sensor networks. Wireless Networks, 17(6), 1423-1440. doi:http://dx.doi.org/10.1007/s11276-011-0356-5
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, ‘Authentication and Authorization:Tool for Ecommerce Security’, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.