An Adaptable Security Framework for Wireless Sensor Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 9

Abstract

The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. Several possible approaches are suggested to improve the security, authentication protocols, and key management schemes in WSNs.  Furthermore, utilizing the existing security protocols in wireless sensor networks has led us to propose a secure framework which incorporates security protocols in a way that minimizes the energy consumption of the sensor nodes. Our algorithm ensures data confidentiality, node authentication, and data integrity while remaining within acceptable memory, time and energy constrains.

Authors and Affiliations

Hesham A. El Zouka

Keywords

Related Articles

Colored Image Segmentation using K-Means Algorithm

Hand gestures are natural means of communication for human beings and even more so for hearing and speech impaired people who communicate through sign language. Unfortunately, most people are not familiar with sign langu...

Detection and Prevention of Gray Hole and Black Hole Attack in MANET

An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex whi...

A comparative study of chain based routing algorithms in wireless sensor networks

Many routing algorithms for Wireless Sensor Networks (WSNs) are designed and presented in the literature. The main target of these algorithms is to improve the performance of WSNs. In this paper, a comparative study of c...

Demand Forecasting and Demand Supply Management of Vegetables in India: A Review and Prospect

Vegetable quantity arrival to market varies every day with which its prices also changes rapidly. This paper analyses the factors that affect the rapid change in prices of vegetables such as demand forecasting, demand su...

A Novel Technique for Trust Delivery in the Cloud

For many organizations, keeping data private and secure has also become a compliance requirement. Cloud providers offering Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) offer a “shared responsibil...

Download PDF file
  • EP ID EP650604
  • DOI 10.24297/ijct.v13i9.2390
  • Views 82
  • Downloads 0

How To Cite

Hesham A. El Zouka (2014). An Adaptable Security Framework for Wireless Sensor Networks. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 13(9), 4898-4906. https://europub.co.uk/articles/-A-650604