We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Towards an Approach for Improved Security in Wireless Networks

Published on March 2013 by T Senthil Kumar, Sugeerth Murugesan
International Conference on Innovation in Communication, Information and Computing 2013
Foundation of Computer Science USA
ICICIC2013 - Number 1
March 2013
Authors: T Senthil Kumar, Sugeerth Murugesan
4b3302ec-bc72-4810-b64b-e21275f9f325

T Senthil Kumar, Sugeerth Murugesan . Towards an Approach for Improved Security in Wireless Networks. International Conference on Innovation in Communication, Information and Computing 2013. ICICIC2013, 1 (March 2013), 9-13.

@article{
author = { T Senthil Kumar, Sugeerth Murugesan },
title = { Towards an Approach for Improved Security in Wireless Networks },
journal = { International Conference on Innovation in Communication, Information and Computing 2013 },
issue_date = { March 2013 },
volume = { ICICIC2013 },
number = { 1 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 9-13 },
numpages = 5,
url = { /proceedings/icicic2013/number1/11285-0117/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovation in Communication, Information and Computing 2013
%A T Senthil Kumar
%A Sugeerth Murugesan
%T Towards an Approach for Improved Security in Wireless Networks
%J International Conference on Innovation in Communication, Information and Computing 2013
%@ 0975-8887
%V ICICIC2013
%N 1
%P 9-13
%D 2013
%I International Journal of Computer Applications
Abstract

Wireless sensor networks are now widely used in military surveillance, industrial applications and civilian uses such as pollution control, forest fire detection, farming etc. Their emergence has posed many unique challenges to researchers. The security of such networks is of utmost importance and as such has been extensively researched. These networks are vulnerable to external threats that may try to gain unauthorized access with malicious intent. In this paper we look at a few security algorithms used on wireless sensor networks. These include SPINS, TinySec, LEAP (Localized Encryption and Authentication Protocol) and PADS (Practical Algorithm for Data Security). Areas that are covered include: architectures and routing protocols, security issues, algorithms, and performance issues for wireless sensor network design

References
  1. Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer Security, 28:270–299, (1984).
  2. Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In Network and Distributed System Security Symposium, NDSS '01, February 2001.
  3. Adrian Perrig, Ran Canetti, J. D. Tygar, and Dawn Song. Efficient authentication and signing of multicast streams over lossy channels. In IEEE Symposium on Security and Privacy, May 2000.
  4. Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong. TAG: A tiny aggregation service for ad-hoc sensor networks. In The Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), 2002.
  5. Samuel R. Madden, Robert Szewczyk, Michael J. Franklin, and David Culler. Supporting aggregate queries over ad-hoc wireless sensor networks. In Workshop on Mobile Computing and Systems Applications, 2002.
  6. M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), 1997.
  7. Mihir Bellare, Joe Kilian, and Phillip Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362-399, December 2000.
  8. Chris Karlof David Wagner. In Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures.
  9. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy, K. Jones. On Providing Anonymity in Wireless Sensor Networks. In Proceedings of the Tenth International Conference on Parallel and Distributed Systems (ICPADS'04).
  10. Chris Karlof, Naveen Sastry, David Wagner. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. ACM SenSys 2004, November 3-5, 2004.
  11. Sencun Zhu, Sanjeev Setia, Sushil Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In The Proceedings of the 10th ACM conference on Computer and communications security, 2003.
  12. Mayank Saraogi, Security in Wireless Sensor Networks.
  13. Daniel E. Burgner, Luay A. Wahsheh, Security of Wireless Sensor Networks, 2011 Eighth International Conference on Information Technology: New Generations.
Index Terms

Computer Science
Information Sciences

Keywords

Tiny Sec Leap Pads Spins Wireless Sensor Networks Security Algorithms Architectures Snep Spins