Essay Example on Proposed work Develops the security Level in Wireless Sensor Network








Abstract Our proposed work develops the security level in wireless sensor network for multicast communication by using Elliptic Curve Integration Encrypted Schema ECIES Firstly a wireless sensor network is constructed by initiator We focus to prolong the network lifetime of created Wireless Sensor Network The dynamically moving sensor nodes are grouped to form a multicast group and perform multicast communication An initiator creates the group and distributes the group key using proposed Elliptic Curve Integration Encrypted Schema ECIES Initiator encodes the EC point generates authentication code and uses digital signature for security On verification of responder secure is completed between initiator and responder We plot the graph for Packet Delivery Ratio Cost and Overhead of nodes 1 Introduction Wireless sensor networks WSN sometimes called wireless sensor and actuator networks WSAN are spatially distributed autonomous sensor to monitor physical or environmental conditions such as temperature sound pressure etc and to cooperatively pass their data through the network to other locations The more modern networks are bi directional also enabling control of sensor activity The development of wireless sensor networks was motivated by military applications such as battlefield surveillance today such networks are used in many industrial and consumer applications such as industrial process monitoring and control machine health monitoring and so on Routing protocols for wireless sensor networks are used to transmit messages from sources to destinations They can be classified as unicast broadcast and multicast Unicast is used to send a message from one source to one destination i e One to One Broadcast is used to send a message from one source to all possible destinations i e One to All Multicast is used to send a message from one source to multiple destinations stating an interest in receiving the traffic i e One to Many Use of multicast is of great interest it is used to send the same report to several sinks Multicasting is introduced to reduce bandwidth consumption in the network for various applications which include data replication assignment of tasks and sending of commands to a specific group of sensors queries to multiple sensors etc In a sensor network there are many tiny nodes called the sensors which are deployed for the purposes to sense data and then to transmit the data to the nearby base station Sensor networks are mainly classified into two categories distributed and hierarchical In a hierarchical wireless sensor network HWSN there is a hierarchy among the nodes based on their capabilities base stations cluster heads and sensor nodes Sensor nodes are inexpensive limited capability and generic wireless devices

Each sensor has limited battery power memory size and data processing capability and short radio transmission range Sensor nodes in a cluster also called a group communicate each other in that cluster and finally communicate with the cluster head CH Usually Cluster heads have more resources than sensors which are equipped with high power batteries large memory storages powerful antenna and data processing capabilities To achieve security in wireless sensor networks it is important to encrypt messages before sent among sensor nodes Keys for encryption purposes must be agreed upon by communicating nodes Due to resource constraints achieving such key agreement in wireless sensor networks is nontrivial Many key agreement schemes used in general networks such as Diffie Hellman and public key based schemes are not suitable for wireless sensor networks Pre distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the network size is large Recently a random key pre distribution scheme and its improvements have been proposed A common assumption made by these random key predistribution schemes is that no deployment knowledge is available Key establishment and management is the core of security protocols for wireless sensor networks deployed in the hostile environment Due to the strict resource constraints traditional asymmetric key cryptosystems such as public private key based schemes are infeasible for large scale wireless sensor networks Research shows that pre distributing pairwise keys into wireless sensor nodes before deployment is a practical way to deal with the key establishment problem

Random key based key predistribution schemes only provide probabilistic connectivity of the network and some level of network resilience Efficient pairwise key establishment and management scheme to achieve both network connectivity and resilience for static wireless sensor networks and supports large network size and has lower communication and computational overhead Wireless sensor networks WSN are typically deployed in an unattended environment where the legitimate users can login to the network and access data as and when demanded A wireless sensor network WSN consists of thousands of sensors and one base station Sensors are deployed in the network to monitor target area and sense information according to the applied application then send this information to the base station Adversary can inject false information in the network or compromise the routing information between nodes or between nodes and base station Thus make the wireless sensor network secure is considered a very important issue Consequently user authentication is a primary concern in this resource constrained environment before accessing data from the sensor gateway nodes 2 Problem definition Wireless sensor network are formed by deploying as large number of sensor nodes in an area The highly sensitive nature of the collective information makes security in this special network is crucial concern To hide sensitive message from the passive attackers and provide multicast communication are the most important issue in network security

Write and Proofread Your Essay
With Noplag Writing Assistance App

Plagiarism Checker

Spell Checker

Virtual Writing Assistant

Grammar Checker

Citation Assistance

Smart Online Editor

Start Writing Now

Start Writing like a PRO