An Adaptable Security Framework for Wireless Sensor Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 9

Abstract

The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. Several possible approaches are suggested to improve the security, authentication protocols, and key management schemes in WSNs.  Furthermore, utilizing the existing security protocols in wireless sensor networks has led us to propose a secure framework which incorporates security protocols in a way that minimizes the energy consumption of the sensor nodes. Our algorithm ensures data confidentiality, node authentication, and data integrity while remaining within acceptable memory, time and energy constrains.

Authors and Affiliations

Hesham A. El Zouka

Keywords

Related Articles

The place of the stored procedures in the cloud databases

The software as a service model ensures not only cloud applications, but also cloud databases. In this paper we analyze the impact on stored procedures of the switch of the existing application to cloud applications and...

Information Security Awareness Behavior : A Conceptual Model for Cloud

Cloud computing has changed the whole picture that distributed computing used to present such as  Grid computing, server client computing. Despite Cloud offers great benefits, it also introduces a myriad of security thr...

AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE

Abstract: A minimum spanning tree of an undirected graph can be easily obtained using classical algorithms by Prim or Kruskal. MST generation is a NP hard problem. Now this paper represents an algorithm to find minimum s...

Classical Encryption Techniques

This paper reviews some of the classical encryption and modern techniques which are widely used to solve the problem in open networked systems, where information is being received and misused by adversaries by means of f...

A Model for Improving Classifier Accuracy using Outlier Analysis

Anomalies are those records, which have different behavior and do not comply with the remaining records in the dataset. Outlier analysis is the concept to find anomalies in Datasets.  Detecting outliers efficiently is a...

Download PDF file
  • EP ID EP650604
  • DOI 10.24297/ijct.v13i9.2390
  • Views 101
  • Downloads 0

How To Cite

Hesham A. El Zouka (2014). An Adaptable Security Framework for Wireless Sensor Networks. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 13(9), 4898-4906. https://europub.co.uk/articles/-A-650604