Abstract
A wireless sensor network is made up of extremely small autonomous units capable of sensing, computing and communicating. There are numerous restrictions on wireless sensor networks as the resource available to the wireless sensor network is limited. Thus, a number of clustering protocols in a routing sensor organization of sensor networks have been proposed in the literature which increase the throughput, save energy and decrease the delay in the system. In this paper, we put forward SNP, the one of its type link layer security architecture for wireless sensor networks. In this, the design vulnerabilities which were found in the protocols such as 802.11b and GSM are addressed using SNP. Security protocols have very conservative approach while guaranteeing the security and typically add up around 16-32 bytes as overhead. Owing to the scenario that sensor networks have limited supply of energy, little memory and low power processors, a 30 byte packet is more of unaffordable luxury for the wireless sensor networks. In SNP, the different trade-offs between separate cryptographic algorithms and wireless sensor network limitations are used to find an optimum point where packet overhead, security and resource requirements are met.
Highlights
The applications designed by using wireless sensor networks are usually missioned critical and make data security and data privacy as prime requirements
DESIGN OBJECTIVES While designing SNP there were three major goals which are as follow discussion and the design of wireless sensor networks which have extreme resource scarcity, it becomes of critical importance that the security mechanisms are used in a fashion which provides necessary protection while handling the overhead issues
Ease of Use It can be expected that the security protocols which will deal with the higher levels will find link-layer based architecture as primitive and use them as a component in them
Summary
These find their use in numerous applications from non-overlapping applications which range from military uses to agricultural utilizations. The applications designed by using wireless sensor networks are usually missioned critical and make data security and data privacy as prime requirements. In wireless sensor network, achieving security is a challenging task as there is communication between different nodes makes it prone to a breach. Authentication and encryption need to go hand in hand through the transport node. There is a significant enthusiasm over the utilization of wireless sensor
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have