An Adaptable Security Framework for Wireless Sensor Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 9

Abstract

The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. Several possible approaches are suggested to improve the security, authentication protocols, and key management schemes in WSNs.  Furthermore, utilizing the existing security protocols in wireless sensor networks has led us to propose a secure framework which incorporates security protocols in a way that minimizes the energy consumption of the sensor nodes. Our algorithm ensures data confidentiality, node authentication, and data integrity while remaining within acceptable memory, time and energy constrains.

Authors and Affiliations

Hesham A. El Zouka

Keywords

Related Articles

Gradient observability and sensors for hyperbolic systems

The aim of this paper is to develop useful rigorous results related tothe gradient observability and sensors. The concept of gradient strategic sensors is characterized and applied to the wave equation. This emphasizes t...

Usability Evaluation Approach for VLS: A Conceptual Framework

E-learning software systems have been proposed by many researchers and academics as alternative platform for pedagogy other than traditional face-to-face. One of such information systems (IS) is Virtual learning Systems...

ANALYSIS OF HUMAN FACE RECOGNITION ALGORITHM USING PCA+FDIT IN IMAGE DATABASE FOR CRIME INVESTIGATION

In general, the field of face recognition has lots of research that have put interest in order to detect the face and to identify it and also to track it. Many researchers have concentrated on the face identification and...

ENVIRONMENTAL IMPLICATIONS OF CELL PHONES PENETRATION AND DISPOSAL IN KENYA

Kenya has over six million active  mobile subscribers who may at some point want to replace or   get rid of old mobile phones. A big number of the mobile phones were recently switched off for not being genuine without...

Review on Software Testing Model Approach for Efficient Bug Finding With Yin-Yang Testing Theory

Model Selection for Software testing is very important prospective in various product accuracy. Through research on software testing model selection, seeking the most appropriate testing method to achieve most reasonable...

Download PDF file
  • EP ID EP650604
  • DOI 10.24297/ijct.v13i9.2390
  • Views 107
  • Downloads 0

How To Cite

Hesham A. El Zouka (2014). An Adaptable Security Framework for Wireless Sensor Networks. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 13(9), 4898-4906. https://europub.co.uk/articles/-A-650604