We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Article:Security in Wireless Sensor Networks using Frequency Hopping

by Gaurav Sharma, Suman Bala, A. K. Verma, Tej Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 6
Year of Publication: 2010
Authors: Gaurav Sharma, Suman Bala, A. K. Verma, Tej Singh
10.5120/1686-2247

Gaurav Sharma, Suman Bala, A. K. Verma, Tej Singh . Article:Security in Wireless Sensor Networks using Frequency Hopping. International Journal of Computer Applications. 12, 6 ( December 2010), 1-5. DOI=10.5120/1686-2247

@article{ 10.5120/1686-2247,
author = { Gaurav Sharma, Suman Bala, A. K. Verma, Tej Singh },
title = { Article:Security in Wireless Sensor Networks using Frequency Hopping },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 6 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number6/1686-2247/ },
doi = { 10.5120/1686-2247 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:00:56.152202+05:30
%A Gaurav Sharma
%A Suman Bala
%A A. K. Verma
%A Tej Singh
%T Article:Security in Wireless Sensor Networks using Frequency Hopping
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 6
%P 1-5
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. These networks are vulnerable to internal and external attacks due to the lack of tamper-resistant packaging and the insecure nature of wireless communication channels. Since most of the existing routing protocols are application specific and hence do not satisfy the security constraints of wireless sensor networks. Whenever any device comes within the frequency range can get the access to the transmitting data and may affect the transmission. In this paper, we simulated the concept of frequency hopping and proved it a better approach to provide security in WSN..

References
  1. Ad hoc on-demand distance vector (AODV) routing. Online Available: http://www.ietf.org/rfc/rfc3561.txt
  2. Bisdikian, C. 2001. An overview of the Bluetooth Wireless technology. IEEE Communication Magazine, vol. 39.
  3. Bruce Barnett. AWK – A Tutorial and Introduction. http://www.grymoire.com/Unix/Awk.html
  4. Carman, D., Krus, P., and Matt, B., 2000. Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs.
  5. Crow, B., Widjaja, I., Kim, J., and Sakai, P. 1997. IEEE 802.11 Wireless Local Area Networks. IEEE Communication Magazine, Vol. 35.
  6. Ganesan, R., Govindan, S., Shenker, and Estrin, D., 2001. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Computing and Communications Review, vol. 4.
  7. IEEE 802.15.4 WPAN-LR Task Group Website: http://www.ieee802.org/15/pub/TG4.html
  8. Jones, K., Waada, A., Olaniu, S., Wison, L., and Eltoweissy, M. 2003. Towards a new paradigm for Securing Wireless Sensor Networks. New Security Paradigms workshop 2003.
  9. Karlof, C., and Wagner, D., 2003. Secure routing in wireless sensor networks: attacks and countermeasures. University of California at Berkeley, USA, Ad Hoc Networks 1 (2003).
  10. Koubaa,A., Mario, A., Bilel, N., SONG, Y. Improving the IEEE 802.15.4 Slotted CSMA-CA MAC for Time-Critical Events in Wireless Sensor Network.
  11. Marc Greis. Ns Tutorial. http://www.isi.edu/nsnam/ns/tutorial/index.html
  12. Roosta, T., Shieh, S. and Sastry, S., 2006. Taxonomy of Security Attacks in Sensor Networks and Countermeasures. Berkeley, California, University Press.
  13. Royer, E., and Perkins, C. An Implementation of the AODV Routing Protocols. http://reference.kfupm.edu.sa/content/i/m/an_implementation_study_of_the_aodv_rout_2328699.pdf
  14. Sastry, N., and Wagner, D., 2004. Security considerations for ieee 802.15.4 networks. In Proceedings of ACM workshop on Wireless security.
  15. TCL Tutorial. http://www.tcl.tk/man/tcl8.5/tutorial/tcltutorial.html
  16. Torrieri, D., 1989. Fundamental limitations on repeater jamming of frequency-hopping communications. IEEE Journal on Selected Areas in Communications, vol. 7, no. 4.
  17. Tovmark, K., 2002. Frequency Hopping Systems (Rev. 1.0). Chipcon Application Note AN014. http://electronix.ru/forum/index.php?act=Attach&type=post&id=3712
  18. Tracegraph http://www.tracegraph.com/download.html
  19. Vanninen, T., Tuomivaara, and H., Huovinen, J., 2008. A Demonstration of Frequency Hopping Ad Hoc and Sensor Network Synchronization Method on WARP Boards. WinTech’08, ACM 978-1-60558-187-3/08/09.
  20. Zheng, J., and Lee, M. 2006. A comprehensive performance study of IEEE 802.15.4 – Sensor Network Operations. Wiley Interscience. IEEE Press Chapter 4. 218-237.
  21. Zyren, J., Godfrey T., and Eaton, D. Does frequency hopping enhance security? http://www.packetnexus.com/docs/20010419_frequencyHopping.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Security Frequency Hopping