International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 06 | June -2017
www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
A Paired Key Mechanism for WirelessLink Security for WSNs Poonam Mtech Student, lecturer Computer Science & Enggineering,Kharar, India ----------------------------------------------------------------------***-----------------------------------------------------------------------Abstract - The wireless sensor network has been Due to increase in movable devices in wireless used in many applications for military, weather, communication, wireless sensor networking industrial or many other industries. The wireless applications have become widespread. Major sensor networks are consisted of the low applications using WSNs include monitoring and configuration nodes with limited battery life. The tracking. These applications are used in different security issues have been raised as one of the major areas like environmental monitoring, area concerns for the sensor networks. The security monitoring, health care monitoring, entertainment solution designed for the sensor nodes must be purposes, emergency services, military battlefield, capable of mitigating the attacks with the minimum industrial monitoring. These sensor networks energy consumption and it should not hurt the provide security at various places like at performance of the sensor networks at all. In this supermarkets, homes, agricultural fields and also, paper, a quick encryption method with lightweight monitors the vehicle traffic on main roads, railways, key management scheme has been proposed for the oceans, sea etcetera. Environmental monitoring purpose of security mechanisms of authentication for helps biologists study sensitive wildlife habitats, for the sensor networks. The proposed model has been example the micro-climates on Great Duck Island, designed to provide the best level security by using Maine. Health care applications do constant the lightweight randomized keys form the 2-column monitoring of patient’s health through sensors. In table as the maximum possible energy efficient military, sensors are used for controlling, computing, approach. The proposed model results have been reconnaissance, intelligence, battlefield surveillance evaluated against the existing models and it has been and targeting systems and sensing the presence of found effective on the basis of all of all of the enemies, dangerous equipments like poisonous gases obtained parameters. The experimental results have and explosions. marked the proposed model results as better than There is an increasing interest in the field of wireless the existing model. sensor networks due to the recent advancements in wireless communication and microelectronics. A Keywords - Key management, lightweight key sensor network includes conveying a variety of scheme, crypto key management, AKA, CBC. sensors for distributed monitoring of real time events. As the sensor nodes are battery powered, the I. INTRODUCTION sensor networks have limited energy. Also, small amount of memory and computational capability is Wireless sensor network mainly consists of huge held in sensor nodes and can be deployed in remote number of autonomous devices, which are batteryareas. These sensor networks are used for different powered and each device is known as sensor node. life critical applications such as monitoring patients These sensor nodes are dispersed over a particular in hospitals and military applications. So to use area and are capable to gather and transmit sensor networks in these applications, a good information about the environment as to provide fine security infrastructure is essential. It is very explanations of a phenomenon. A sensor node is challenging issue to make design of security protocol equipped with one or more sensors, data processing due to the limited power and memory. In this paper capabilities, short-range radio communications, a security issues in Directed diffusion are addressed. small amount of memory and a power supply. Sensor Directed Diffusion is a novel routing protocol for devices work together which each other in order to sensor networks. A look-in to possible attacks and perform basic operations for example sensing, counter measures is provided. The paper is communication and data processing. Š 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 2008