Related Work
The key management problem is an bigger issue in sensor field. Each and every sensor nodes are needed to transmit the node, then only the data’s are reached to base station, so each and every sensor node within a group need an keys to transmit the data. While attacker entered and also get the full access of sensor node, and ready to hack data, but they need to wait. Because the node are none of the keys at the time, transmitting time only the nodes get access of keys from the cluster head. A cluster having a variety of group in the network and each and every groups are specified using their names. All of the groups are having the number of nodes to transmit the information over the network.
The pair-wise key establishment between the sensor nodes are still more difficult to handle. Attackers are not easily handle the sensor nodes, they need to get the full access of node and also they try get the access of cluster. But the cluster get won’t allow to compromising the group and the cluster head provide the duplicated data’s, if the attacker give any kind of problem to sensor nodes.
Recent advances in wireless technology provide the security of blocking the attackers and also need to eliminate the attackers in the network. But in this paper providing the new technique to handle the attacker using an duplicated data as an backbone and also using dynamic key management in this system to providing the more security of the data’s in the wireless sensor network (WSN). So attackers are get confused to finds the original data’s. They don’t know the original data’s are safely send to the base station.
The Key activity of this paper is to avoid the data loss in the network and also providing...
... middle of paper ...
...obile Sink Replica In Wireless Sensor Network And Authenticate It With Key Distribution” (IJERT), ISSN:2278-0181, Vol. 2 Issue 6, June 2013.
[7]B.J. Culpepper and H.C. Tseng , “Sinkhole Intrusion Indicators in DSR MANETs,”Proc. First Int’l Conf. Broadband Networks (Broad-Nets ’04), pp.681-688, Oct. 2004.
[8]Y. Tirta, Z. Li, Y. Lu, and S. Bagchi, “Efficient Collection of Sensor Data in Remote Fields Using Mobile Collectors,” Proc. 13th Int’l Conf. Computer Comm. And Networks (ICCN ’04), Oct. 2004.
[9]A. Rasheed and R. Mahapatra, “An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks,” Proc. IEEE 27th Int’l Performance Computing and Comm. Conf. (IPCCC ’08), pp. 264-270, Dec. 2008.
[10]L. Lamport, “Password Authentication with Insecure Communication,” Comm. ACM, vol, 24, no. 11, pp. 770-772, Nov. 1981.
COMP09022 Network Design BSc COMPUTER NETWORKING COMP09022 ICMPv6 Prepared by B00270675 13-03- 2015 WORD COUNT (0000) TABLE OF CONTENTS TITLE PAGE……………………………………………... 1 TABLE OF CONTENTS………………………………….. 2 INTRODUCTION TO THE REPORT……………………. 3 TABLE OF FEATURES.......................................................4
Giammarco, Erica. "U of S Central Authentication Service (CAS)." U of S Central Authentication Service (CAS). N.p., Jan. 2013. Web. 20 Nov. 2013. http://www.sciencedirect.com.cyber.usask.ca/science/article/pii/S0191886912003650?np=y
Whitman, M. E. & Mattord, H. J. (2011) Principles of Information Security. Boston: Course Technology. (Whitman & Mattord, 2011)
Lv, X., Li, H., Wang, B. (2012) Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks ISSN: 19390114
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
6) Michele Zorzi, “Wireless Sensor and networks: Recent trends and Research Issues’’, University of Padova, Italy, IEEE communication society, Poland, April 28-30, 2008.
For thousands of years, cryptography and encryption have been used to secure communication. Military communication has been the leader in the use of cryptography and the advancements. From the start of the internet, there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989. This new method of communication has called for a large need for information security.
Melford, RJ 1993, 'Network security ', The Internal Auditor, vol. 50, no. 1, p. 18.
The examples discussed earlier make use of standard IBE which is not compatible with the sensor in a BSN. Solution for this is an IBE-Lite; a lightweight IBE that has the properties of standard IBE, and compatible with a BSN sensor is devised. The ability to use an arbitrary string to generate a public key, and the ability to create a public key separately from the corresponding secret key are few useful properties. IBE-Lite makes use of elliptic curve cryptography (ECC), a public key encryption system suitable for BSN [2].
De Poorter, E., Troubleyn, E., Moerman, I., & Demeester, P. (2011). IDRA: A flexible system architecture for next generation wireless sensor networks. Wireless Networks, 17(6), 1423-1440. doi:http://dx.doi.org/10.1007/s11276-011-0356-5
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, ‘Authentication and Authorization:Tool for Ecommerce Security’, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.
Over time the different means of receiving the internet have changed several years ago, a phone line would proved a slow connection to the internet, but would not be useful when storing and...
This report will describe the two forms of data communications in terms of the physical interfaces and modes of operation. It will describe the features of data communications equipment in relation to synchronous and asynchronous communication including modems, network terminating units and sending and receiving equipment.
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.