CFP last date
20 January 2025
Reseach Article

Securing Disseminated Data in Wireless Sensor Networks using Reliable Schemes

by Nagashree B. N., Gururaj H. L., Ramesh B.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 1
Year of Publication: 2016
Authors: Nagashree B. N., Gururaj H. L., Ramesh B.
10.5120/ijca2016911001

Nagashree B. N., Gururaj H. L., Ramesh B. . Securing Disseminated Data in Wireless Sensor Networks using Reliable Schemes. International Journal of Computer Applications. 148, 1 ( Aug 2016), 43-46. DOI=10.5120/ijca2016911001

@article{ 10.5120/ijca2016911001,
author = { Nagashree B. N., Gururaj H. L., Ramesh B. },
title = { Securing Disseminated Data in Wireless Sensor Networks using Reliable Schemes },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 1 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 43-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume148/number1/25725-2016911001/ },
doi = { 10.5120/ijca2016911001 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:52:11.092805+05:30
%A Nagashree B. N.
%A Gururaj H. L.
%A Ramesh B.
%T Securing Disseminated Data in Wireless Sensor Networks using Reliable Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 1
%P 43-46
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks are autonomous sensors that are spatially distributed to supervise temperature, pressure, sound and other environmental conditions and to pass the data co-operatively to a main location through the network. The WSN is composed of several thousands of nodes, where each node is linked to one or several sensors. As wireless sensor networks continue to grow, the need for security mechanisms also does. After a WSN is deployed it is necessary to spread data through wireless links in order to update the configuration parameters and to distribute management commands to sensors. This is termed as data dissemination in WSNs. All presented data dissemination protocols experience from two drawbacks. First, they are based on centralized approach. Second, protocols were not designed with security in mind. Hence adversaries can easily launch attacks on the network.

References
  1. D. He, C. Chen, S. Chan and J. Bu, “DiCode: DoS-resistant and distributed code dissemination in wireless sensor networks,” IEEE Trans. Wireless Communication., vol. 11, no. 5, pp. 1946-1956, May 2012.
  2. T. Dang, N. Bulusu, W. Feng and S. Park, “DHV: A code consistency maintenance protocol for multi-hop wireless sensor networks,” in Proc. EWSN, pp. 327-342, 2009.
  3. K. Lin and P. Levis, “Data Discovery and Dissemination with DIP,” in Proc. ACM/IEEE IPSN, pp. 433-444, 2008.
  4. G. Tolle and D. Culler, “Design of an application-cooperative management system for wireless sensor networks,” in Proc. EWSN, pp. 121- 132, 2005.
  5. J.W. Hui and D. Culler, “The Dynamic behaviour of a Data Dissemination protocol for network programming at scale”, in Proc. ACM SenSys, pp. 81-94, 2004.
  6. M. Ceriotti et al., “Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment,” in Proc. IEEE IPSN, pp. 277- 288, 2009.
  7. D. He, S. Chan, S. Tang, and M. Guizani, “Secure data discovery and dissemination based on hash tree for wireless sensor networks,” IEEE Trans. Wireless Communication., vol. 12, no. 9, pp. 4638-4646, Sept. 2013.
  8. S. Rahman, N. Nasser, T. Taleb, “Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve,” Wireless Communications and Mobile Computing, vol. 10, no. 5, pp. 662-671, May 2010.
  9. M. Rahman, N. Nasser, and T. Taleb, “Pairing-based secure timing synchronization for heterogeneous sensor networks,” in Proc. IEEE GLOBECOM, pp. 1-5, 2008.
  10. Geoss. http://www.epa.gov/geoss/.
  11. NOPP, http://www.nopp.org/.
  12. ORION,http://www.joiscience.org/ocean observing/advisors.
Index Terms

Computer Science
Information Sciences

Keywords

Dissemination protocols security wireless sensor networks efficiency.