National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 |
Foundation of Computer Science USA |
RTMC - Number 6 |
May 2012 |
Authors: Ajay Gautam, Ritu, Naveen Sharma |
12d88995-ae03-45f5-a26c-a2069a7bdcac |
Ajay Gautam, Ritu, Naveen Sharma . Alternate Path Approach to Avoid Intrusion Detection in Wireless Sensor Networks. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 6 (May 2012), 21-25.
Wireless Sensor Network (WSN) is a new computing paradigm that emerged from the fusion of the SCADA systems and Ad hoc networks technologies. WSN derives the networking characteristics of ad-hoc network and combines it with the hardware facilities of tiny wireless sensors. Once a sufficient number of nodes have been deployed, the sensor network can be used to fulfill its task, such as measuring the physical variables. This task can be issued and supervised by an external entity connected to the WSN, such as manager or supervisor. Due to insecure nature of the wireless link and the dynamically changing topology, wireless ad-hoc networks require a careful and security oriented approach for designing protocols. Also any node can join or leave the network at any time. This is security breach as the joining node can be a malicious node and can have unwilling effects on the network performance. So it is very important to authenticate the joining nodes from the establishment of the network. Cluster based architecture is used because it is easily manageable and more secure than other architectures. In cluster based architectures gateways are used for inter cluster communication. The aim of this article to proposes the new cluster base security architecture which starts from the initialization of the network.