Abstract

WSN consists of large number of Sensor Nodes where each Sensor Nodes in the network are connected by a wireless channels. The node will sense the environmental data and sends to the other sensor nodes or Base Station. During the transmission of data from one node to another node, different security techniques are used. To implement security, such as confidentiality, integrity and authentication, keys are needed. Key Management is important for implementing security in a wireless Sensor Network. Wireless Sensor Networks are believed to be the enabling technology for ambient intelligence. The common attacks that can be made on WSN are attacks like eavesdropping, man-in-the middle attack and passive attacks like replay attacks, DoS attacks, and cloning attacks. An authentication protocol can enable the senders to confirm that the packet was truly sent to authentic receiver. Our solution achieves proper authentication while keeping energy consumption at minimum . A separate key for each node to node communication is generated so that detection of malicious node is easily possible.The use of timestamping provides additional security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call