A Review on Authentication and Security Maintenance in Wireless Sensor Network

International Journal of Mobile Computing and Application
© 2016 by SSRG - IJMCA Journal
Volume 3 Issue 2
Year of Publication : 2016
Authors : Dr.P.Maxmillon and R.Franklin
pdf
How to Cite?

Dr.P.Maxmillon and R.Franklin, "A Review on Authentication and Security Maintenance in Wireless Sensor Network," SSRG International Journal of Mobile Computing and Application, vol. 3,  no. 2, pp. 10-13, 2016. Crossref, https://doi.org/10.14445/23939141/IJMCA-V3I3P103

Abstract:

Wireless sensor networks (WSN) are charity to scrutinize and to sustain the physical orconservational conditions like temperature, sound, pressure, etc. and exploited to pass theinformation through the network to a central location. The wireless networks are bi-directional thatassistances in controlling and preserving the sensor activities. Wireless sensor networks are charity inmany security attacks with false data injection, data forgery, and hearing. A large sensornetwork with the discrete sensor nodes aims on security factor. A node injected into the sensornetwork for the data forwarding results in several attacks. These attacks are outcomes in theinoculation of false data in the wireless sensor network. In a huge scale wireless sensor network,perceiving reports injected by co-operated nodes is a large research confront. If a node isconjoined, all the security information collects the nodes are turns out to be reachable to theattacker. In order to increase the maintenance and security level in the wireless sensor networks,authentication system is designed. In this authentication system, the sanctuary maintenance level is increased by cleaning the false data. The wireless sensor networks aims on removing the injected false data attack and the moderation technique is designed for high security maintenance. The riddling false data are executed earlier to ease the system with the high security. Our enquiry work aims to increase the security and maintenance level in the wireless network.

Keywords:

Wireless Sensors Network (WSN)

References:

[1] Rongxing Lu., Xiaodong Lin., Haojin Zhu., Xiaohui Liang, and Xuemin (Sherman) Shen., “BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks,” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. X, NO. X, XX 2010 
[2] SuatOzdemir., and HasanÇam., “Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks,” IEEE/ACM Transactions ON Networking, VOL. 18, NO. 3, JUNE 2010
[3] Nicola Basilico., Nicola Gatti., MattiaMonga., and Sabrina Sicari., “Security Games for Node Localization through Verifiable Multi-lateration,” IEEE Transactions on Dependable and Secure Computing, VOL. 11, and NO: 1, January/February 2014
[4] Jinyuan Sun., Chi Zhang.,Yanchao Zhang., and Yuguang Fang., “SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks,” IEEE Transactions on Dependable and Secure Computing, vol. 8, NO. 2, March-APRIL 2011 L.Deviet al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.5, May- 2015, pg. 53-70 
[5] ArifSelcukUluagac., Raheem A. Beyah., Yingshu Li., and John A. Copeland., “VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 7, JULY 2010 
[6] Rui Zhang., Yanchao Zhang., and KuiRen., “Distributed Privacy-Preserving Access Control in Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, VOL. 23, NO. 8, August 2012
[7] Hamid Al-Hamadi., and Ing-Ray Chen., “Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks,” IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 10, NO: 2, JUNE 2013
[8] Alexander W. Min., and Kang G. Shin., “Robust Tracking of Small-Scale Mobile Primary User in Cognitive Radio Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 24, NO. 4, April 2013
[9] MohamadBadra., and SheraliZeadally., “Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy,” IEEE Transactions on Information Forensics and Security, Vol. 9, NO: 2, February 2014