Beruflich Dokumente
Kultur Dokumente
Abstract:
Efficient utilization of energy and security has been a core area of research in wireless sensor networks. Sensor nodes used
in a network are battery operated having low power capabilities. Batteries of these nodes cannot be recharged frequently in
the field setting, so energy optimization becomes paramount in increasing the battery-life and, consequently, the network
lifetime. To design a secure sensor network, that has low energy consumption, is a challenging issue. In this paper, we will
study about energy-efficient security protocols which provide strong security and decreases energy consumption.
Keywords: wireless sensor networks, sensor nodes, transmission, security, energy efficiency.
Introduction
A Wireless Sensor Network consists of a large number of sensors, each of which are physically small devices, and are
equipped with the capability of sensing the physical environment, data processing, and communicating wirelessly with
other sensors. Generally, we assume that each sensor in a wireless sensor network has certain constraints with respect to its
energy source, power, memory, and computational capabilities.
Wireless Sensor Networks (WSN) has emerged as one of the most exciting fields in Computer Science research over
decades. Processors with on-board sensors are said to be nearing the size of a dust. Applications of WSN include military
surveillance, habitat monitoring, structural monitoring and medical and health etc.
Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have
very low processing power and radio ranges, permit very low energy consumption and perform limited and specific
monitoring and sensing functions. Several such wireless sensors in a region self-organize and form a WSN. Information
based on sensed data can be used in agriculture and livestock, driving or even in providing security at home or in public
places. A key requirement from both the technological and commercial point of view is to provide adequate security
capabilities. Fulfilling privacy and security requirements in an appropriate architecture for WSNs offering pervasive
services is essential for user acceptance. Five key features need to be considered when developing WSN solutions:
scalability, security, reliability, self-healing and robustness. The security in wireless sensor networks (WSNs) is a critical
issue due to the inherent limitations of computational capacity and power usage. Security is broadly used term
encompassing the characteristics of authentication, integrity, privacy and non repudiation. The more the dependency on the
information provided by the networks has been increased, the more the risk of secure transmission of information over the
network has increased. For the secure transmission of various types of information over networks, several cryptographic,
steganographic and other techniques are used.
Review of literature
In this paper, author explores various security issues in wireless sensor networks and tries to give a comparative note of
various existing security approaches. Their contribution is therefore to provide a detailed yet concise analysis of various
existing techniques which will enable the WSN implementers to approach security in an organised way [1].
In this paper, therefore, it is proposed that a key establishment and a data encryption scheme for secure and energy-efficient
data transmission in WSNs be used. The key establishment scheme is an advanced hybrid key establishment scheme which
has not only the efficiency of using a unique secret key but also the security of using a random key of each pair nodes. The
data encryption scheme which is suitable for WSNs uses only exclusive-OR (XOR) operation, message authentication code
(MAC), and time-spacing key derivation function (TSDF) for efficiency and security [2]. This paper investigates the
coalition-based cooperative data transmission mechanism (CCDTM), analyzes its entire energy consumption, and finds out
the optimal number of sensor nodes needed in the cooperative data transmission. The condition under which CC-DTM is
more energy-saving than the cluster approach is also deduced. Furthermore, an energy-load balanced node selection
strategy is proposed. The results of simulation experiment show the validity of this energy efficient data transmission
mechanism.
__________________________________________________________________________________________
2015 ,IRJIE-All Rights Reserved
Page -1
ISSN: 2395-0560
__________________________________________________________________________________________
2015 ,IRJIE-All Rights Reserved
Page -2
ISSN: 2395-0560
Research methodology
To study existing protocols related to security and energy efficiency in Wireless Sensor Networks and propose some
mechanisms for data aggregation to reduce redundancy. We will study to design an energy efficient protocol that provides
scalable network support on Wireless Sensor Networks. As the energy efficient data transmission increases the lifetime of
each sensor node, we will propose a system which provides reliable and secure data transmission. In wireless sensor
network, the original message is splitted into packets and then transmitted in form of packets between nodes. For efficient
and secure transmission, we will use data compression with tag. In our approach, we first compress the data and then
transmit it to the other node. With the help of compression, the energy consumption of the nodes can be decreased because
less amount of data will be sent to another node.
__________________________________________________________________________________________
2015 ,IRJIE-All Rights Reserved
Page -3
ISSN: 2395-0560
Conclusion
Security of wireless sensor network is main issue in WSNs. Routing, QoS, Provisioning, energy efficiency, security and
multicasting are challenges in wireless sensor networks. We will study to design an energy efficient protocol that provides
scalable network support on Wireless Sensor Networks. This paper represents various security issues and energy efficient
data transmission so that the life time of each sensor node can be increased.
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
Kalpana Sharma. (2010). A Comparative Study of Various Security Approaches Used in Wireless Sensor
Networks. International Journal of Advanced Science and Technology, Vol. 17.
Sang-Eon Lee. (2008). Wireless Sensor Network Protocols for Secure and Energy-Efficient Data
Transmission. 7th Computer Information Systems and Industrial Management Applications.
Na Xia. (2008). Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks. International
Symposium on Computer Science and Computational Technology.
Manik Lal Das (2008). Efficient User Authentication and Secure Data Transmission in Wireless Sensor
Networks. ICON.
Akbar Abbasi. (2009). Better Security for Wireless Sensor Networks, 2009 International Conference on Future
Networks.
D.Baghyalakshmi; J. Ebenezer; S.A.V. Satyamurty. (2010). Low Latency and Energy Efficient Routing
Protocols for Wireless Sensor Networks, ICWCSC.
A.V Taddeo; A. Ferrante. (2010). Security and Packets Delivery Trade-off for WSN. IEEE CCNC.
S.Sharafkandi; David H.C Du; Alireza Razavi. (2010). A Distributed and Energy Efficient Algorithm for Data
Collection in Sensor Networks. 39th International Conference on Parallel Processing Workshops, pp 571-580.
Z. Peng; YU Jian-ping. (2010). Secure Data Aggregation for Sensor Networks. ICSP, pp 1853-1856.
W. Fang et al. (2010). Energy-Efficient Cooperative Communication for Data Transmission in Wireless
Sensor Networks. IEEE Transactions on Consumer Electronics, Vol. 56, No. 4, November2010, pp 2185-2192.
Mohamed Mubarak T; et al. (2011). Intrusion detection: An Energy efficient approach in Heterogeneous
WSN. PROCEEDINGS OF ICETECT 2011, pp 1092-1096.
S. Lee; et al. (2011). Secure and Energy-Efficient Image Transmission for Wireless Sensor Networks, IEEE
Computer Society, pp 137-140.
V.C Sekhar; M. Sarvabhatla. (2012). Security in Wireless Sensor Networks with Public Key Techniques.
International Conference on Computer Communication and Informatics, Jan. 10 12, 2012.
Abhishek Jain; Kamal Kant; M. R. Tripathy. (2012). Security Solutions for Wireless Sensor Networks. Second
International Conference on Advanced Computing & Communication Technologies, pp430-433.
L Arivazhagan; R. Kurunjimalar.(2012).Secure Data Transmission Routing Protocol For Multicasting. IEEEInternational Conference on Advances In Engineering, Science And Management, 2012, pp 586-591.
L.Zhou; Z. Zhang. (2012). A Secure Data Transmission Scheme for Wireless Sensor Networks Based on
Digital Watermarking, 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp 20972102.
M. Zhang; etal. (2013). Energy-efficient and Secure Sensor Data Transmission Using Encompression. 26th
International Conference on VLSI Design and the 12th International Conference on Embedded Systems, pp 31-36.
M. E Mahmoud; X. Shen. (2012). Secure and Efficient Source Location Privacy-Preserving Scheme for
Wireless Sensor Networks. IEEE ICC 2012 - Communication and Information Systems Security Symposium, pp
1123-1127.
__________________________________________________________________________________________
2015 ,IRJIE-All Rights Reserved
Page -4