CFP last date
20 December 2024
Reseach Article

Secure System Practices and Data Access Management in Wireless Sensor Network

by A. R. Uttarkar, H. A. Hingoliwala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 11
Year of Publication: 2014
Authors: A. R. Uttarkar, H. A. Hingoliwala
10.5120/15924-5150

A. R. Uttarkar, H. A. Hingoliwala . Secure System Practices and Data Access Management in Wireless Sensor Network. International Journal of Computer Applications. 91, 11 ( April 2014), 14-19. DOI=10.5120/15924-5150

@article{ 10.5120/15924-5150,
author = { A. R. Uttarkar, H. A. Hingoliwala },
title = { Secure System Practices and Data Access Management in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 11 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number11/15924-5150/ },
doi = { 10.5120/15924-5150 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:27.868359+05:30
%A A. R. Uttarkar
%A H. A. Hingoliwala
%T Secure System Practices and Data Access Management in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 11
%P 14-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks (WSN) are a heterogeneous system with a collection of sensors distributed unbalanced patterns in remote areas, and often in unfriendly environments, without any pre-deployed architecture, and with limited hardware inside them. As the use of wireless sensor networks continuously growing, it should require efficient security mechanisms. Therefore to ensure the security of communication and data access control in WSN plays a vital role and has top significance. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is necessary that these security issues should be addressed from the beginning of design of the system itself. In this paper we are presenting secure network protocol and security mechanism for Data Access Control which is built upon network layer of WSNs and our focus is on data access control and secure network protocol. Here Virtual Counter Manager (VCM) along with the synchronized incremental counter is presented for detection of replay and jamming attack using basis of symmetric key cryptosystem. For access control & prevention from unauthorized access we are presenting Key-Lock Matching (KLM) method.

References
  1. Yao-Tung Tsou, Chun-Shien Lu, " MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks" IEEE transaction on Wireless Communication Vol 12, No. 6 June 2013.
  2. David E. Culler, Wei Hong, "Wireless Sensor Networks: Introduction" Communications Of The ACM, June 2004/Vol. 47, No. 6, pp. 30-33.
  3. Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victorwen and David E Culler, "SPINS: Security Protocols for Sensor Networks" Wireless Networks 8, 521–534, 200 ©?2002 Kluwer Academic Publishers. Manufactured in the Netherlands.
  4. "Key Distribution Mechanisms for Wireless Sensor Networks: A survey", TR-05-07, Department of Computer Science, Rensselaer Polytechnic Institute.
  5. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: security protocols for sensor networks," in Proc. 2001 International Conference on Mobile Computing and Networking, pp. 189–199.
  6. C. Karlof, N. Sastry, and D. Wagner, "TinySec: link layer Security architecture for wireless sensor networks," in Proc. 2004 International Conference on Embedded Networked Sensor Systems, pp. 162–175.
  7. ZigBee Alliance, Zigbee specifications, Technical Report Document 053474r06, 2005.
  8. M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: a secure sensor network communication architecture," in roc. 2007 International Conference on Information Processing in Sensor Networks, pp. 479 - 488.
  9. S. Kun, L. An, N. Peng, and M. Douglas, "Securing network access in wireless sensor networks," in Proc. 2009 International Conference on Wireless Network Security, pp. 261–268.
  10. L. Casado and P. Tsigas, "Contikisec: a secure network layer for wireless sensor networks under the Contiki operating system," in Proc. 2009 Nordic Conference on Secure IT Systems, pp. 133–147.
  11. NIST, National Institute of Standards and Technology, Computer Security Division, AES standard. Available: http://csrc. nist. gov/archive/aes/index. html, 2001.
  12. C. M. Yu, C. S. Lu, and S. Y. Kuo, "Non-interactive Pair wise key establishment for sensor networks," IEEE Trans. Inf. Forensic and Security, vol. 5, no. 3. 2010
  13. C. M. Yu, Y. T. Tsou, C. S. Lu, and S. Y. Kuo,"Constrained function based message authentication fornsensor networks," IEEE Trans. Inf. Zorensic and Security, vol. 6, no. 2, pp. 407–425, 2011.
  14. S. Ganeriwal, S. Capkun, and M. B. Srivastava, "Secure time synchronization in sensor networks," ACM Trans Inf. and Systems Security, vol. 11, no. 4, pp. 1–35, 2006.
  15. H. Burton, "Bloom: space/time trade-offs in hash coding with allowable errors," Commun. of the ACM, vol. 13, no. 7, pp. 422–426, 1970.
Index Terms

Computer Science
Information Sciences

Keywords

Attacks KLM Sensor Networks VCM