12-13-2017, 08:17 AM
Due to lack of tamper-resistant hardware and
broadcast nature of Wireless Sensor Networks (WSNs), security
in sensor networks is one of the major concerns. WSNs consist of
a large number of sensor nodes and a few sink nodes or Storage
node are used to collect information about the state of physical
world and transmit it to interested users. It used in applications
such as, health monitoring, habitat monitoring, military
surveillance and environment sensing. Sensor nodes have limited
resources in term of processing power, battery power, and data
storage. A sensor network that is not fully trusted that's why
privacy is to be preserved. A security approach that use secret
key cryptography and key management. To preserve the
integrity, a digital key is fetched to every node in a network, each
node has to send their localization position as encrypted data
using digital signatures to the storage node and it decrypts that
data and checks the position by using authentication. RSA
algorithm with MD-5 is used for authentication. A malicious node
attacks in any network to disrupt the proper functioning of the
network. Such attacks may cause damage on a large scale
network especially since they are difficult to detect. In this paper,
results shows network parameters like end-to-end delay, energy
consumption attack detection with and without watchdog
security. Hence, this paper focuses on various security issues,
security threats, and various types of attacks.
broadcast nature of Wireless Sensor Networks (WSNs), security
in sensor networks is one of the major concerns. WSNs consist of
a large number of sensor nodes and a few sink nodes or Storage
node are used to collect information about the state of physical
world and transmit it to interested users. It used in applications
such as, health monitoring, habitat monitoring, military
surveillance and environment sensing. Sensor nodes have limited
resources in term of processing power, battery power, and data
storage. A sensor network that is not fully trusted that's why
privacy is to be preserved. A security approach that use secret
key cryptography and key management. To preserve the
integrity, a digital key is fetched to every node in a network, each
node has to send their localization position as encrypted data
using digital signatures to the storage node and it decrypts that
data and checks the position by using authentication. RSA
algorithm with MD-5 is used for authentication. A malicious node
attacks in any network to disrupt the proper functioning of the
network. Such attacks may cause damage on a large scale
network especially since they are difficult to detect. In this paper,
results shows network parameters like end-to-end delay, energy
consumption attack detection with and without watchdog
security. Hence, this paper focuses on various security issues,
security threats, and various types of attacks.