Abstract

The WSN technology is a highly efficient and effective way of gathering highly sensitive information and is often deployed in mission-critical applications, which makes the security of its data transmission of vital significance. However, the previous research paper failed to distinguish the role of centralized server for it being the main controller of the entire network. The decision of nodes communicating with each other in the previous research paper was based on the information received from the adjacent node. However, the proposed research paper will take into account the centralized server to develop a new technique to prevent the black node from joining the wireless sensor network. Key distribution technique along with the implementation of improved AES algorithm double key encryption will play an important role in transferring the data between authorized nodes securely and preventing unauthorized user from accessing it.

Highlights

  • The wireless sensor networks (WSN) are specialized transducers with spatially dispersed and dedicated autonomous sensor nodes for identifying, monitoring and recording the physical and environmental conditions at different locations

  • WSN is a revolutionary technology that comprises of several sensor nodes that are small in size, light in weigh and portable

  • As the WSN deals in highly sensitive information, its processing, gathering and transmittance, security in this spatially dispersed nodal network is of crucial concern

Read more

Summary

INTRODUCTION

The wireless sensor networks (WSN) are specialized transducers with spatially dispersed and dedicated autonomous sensor nodes for identifying, monitoring and recording the physical and environmental conditions at different locations. Sending and receiving secure data in highly callous conditions is not an easy task as the sensor nodes have the tendency to closely interact with their physical environment to process and blend data and www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 9, No 6, 2018 create novel information that must be transmitted to the endstation. External attackers are known for eavesdropping on transmittance of data along with injecting fake data in the network to exhaust energy resource, which will lead to denial of services Another attack on WSN are related to its layered architecture, which makes it susceptible to node capturing, jamming of radio signals, violating redefined protocols, inducing collisions by disrupting a packet, depletion of energy due to recurring retransmission and new connection request to avert the sensor nodes from communicating effectively. A trust management system is broadly classified into two types: credential based trust management system and behavior based trust management system

LITERATURE SURVEY
PROBLEM STATEMENT
PROPOSED WORK
Result
20 CB 2B A2
Decryption
CONCLUSION AND FUTURE SCOPE
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call