International Journal of Engineering and Management Research (IJEMR)

  • Year: 2012
  • Volume: 2
  • Issue: 6

Secure and Efficient Framework for Wireless Sensor Networks by Using Keying Mechanisms

  • Author:
  • M. Ganeshkumar1, P. Sreedevi1, G. Soma Sekhar3, C. Venkateswarlu Sonagiri4
  • Total Page Count: 5
  • DOI:
  • Page Number: 67 to 71

1Dept. of CSE, Holymary Institute of Technology and Science, Hyderabad, Andhra Pradesh, India

3Research Scholar, CSE Department, Acharya Nagarjuna University, India

4Professor & Head, Dept. of CSE, Holymary Institute of Technology and Science, Hyderabad, Andhra Pradesh, India

Abstract

Sensors are inexpensive, low-power devices which have limited resources, designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor's energy consumption. RAPIDLY developed WSN technology is no longer nascent and will be used in a variety of application scenarios. Typical application areas include environmental, military, and commercial enterprises.

In a battlefield scenario, sensors may be used to detect the location of enemy sniper fire or to detect harmful chemical agents before they reach troops. In another potential scenario, sensor nodes forming a network under water could be used for oceanographic data collection, pollution monitoring, assisted navigation, military surveillance, and mine reconnaissance operations. Future improvements in technology will bring more sensor applications into our daily lives and the use of sensors will also evolve from merely capturing data to a system that can be used for real-time compound event alerting. From a security standpoint, it is very important to provide authentic and accurate data to surrounding sensor nodes and to the sink to trigger timecritical responses (e.g., troop movement, evacuation, and first response deployment). Protocols should be resilient against false data injected into the network by malicious nodes. Otherwise, consequences for propagating false data or redundant data are costly, depleting limited network resources and wasting response efforts.

Keywords

Accurate, Low-Power Devices, Reconnaissance, Security and wss