Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks

##plugins.themes.bootstrap3.article.main##

Abstract

Safe path-finding is extremely necessary for multihop wireless systems such as Wireless Sensor  Networks. Multihop wireless systems are more  unprotected to safety outbreaks as associated to  single-stage wireless networks. Cross-layer design  production is a precise significant character for  wireless  sensor  Advanced security  network  is  significant  submissions.  for  the  achievement of announcement among sensor  nodes in wireless sensor network because the  numbers composed is regularly less and the  network is most vulnerable. Numerous Security  methods have been suggested to deliver safety  resolutions besides numerous threats to the Cross layer modification techniques in Wireless sensor  networks. In this paper we overview the existing  schemes for the security of cross-layer design in  wireless sensor networks. The proposed Security  model will provide more security between sensor  nodes and the base station in wireless sensor  network. Security is important for the success of  the wireless sensor network because the data  collected are often sensitive and the network is  particularly vulnerable. In the cross-layer design,  constraints are substituted between changed  layers to protect the well-organized use of energy.  In this paper, we propose a secure security model that is based on cross-layer design. It uses a cross layer optimization


Machine Reproduction consequences confirm that our proposed safety  model better in many situations and in  unpromising violence-disposed to the situation.

References

1. Ameer Ahmed Abbasi, Mohamed Younis, “A survey on clustering algorithms for wireless sensor networks", Computer communication 30(2007)2826-28410.

2. J. N. Al-Karaki and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey”,IEEE Wireless Communication Vol.11, No.6, Dec.2004, pp. 6-28.

3. AmirSepasi Zahmati and Bahman Abolhassani, “EPMPLCS: An Efficient Power Management Protocol with Limited Cluster Size for Wireless Sensor Networks”, Proc. 27th International Conference on Distributed Computing Systems (ICDCS 2007), submitted for publication.

4. W. B. Heinzelman et al., “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Transactions on Wireless Communications Volume 1, No. 4, Oct 2002, pp.660 -670.

5. W. R. Heinemann, A. Chandrakasan, and H. Balkrishnan, “Energy-Efficient Communication Protocol for Wireless Micro sensor Networks”, in Proceedings of 33rd Hawaii International Conference on System Science, Vol. 2, Jan. 2000, pp.1-10.

6. Amir Sepasi Zahmati, Bahman Abolhassani,Ali Asghar Behesti Shirazi and Ali Shojaee Bakhtiari, ”AnEnergy-Efficient protocol with Static clustering for Wireless Sensor Network", proceedings of world academy of science, Engineering and Technology volume 22 July 2007 ISSN 1307-6884.

7. SoheilGhiasi, Ankur Srivastava, Xiaojian Yang, and Majid Sarrafzadeh, “Optimal Energy Aware Clustering in Sensor Networks”, SENSORS Journal, Vol. 2, No. 7, 2002, pp. 258-269.

8. DjallelEddineBoubiche, Sabrina Boubiche, AzeddineBilami, “ACross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs.”IEEE Communications Letters, Vol.19.No.5, May 2015.

9. Geethapriya Thamilarasu, Ramalingam Sridhar, ”Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks.”, Proc.IEEE 2007.

10. Pedro Pinto, Antonio Pinto, Manuel Ricardo, “Cross-Layer Admission Control to Enhance theSupport of Real-time Applications in WSN”, IEEE Sensors Journal, Vol.X.No.X, XX

11. Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33

12. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., “Wireless Sensor Networks: A Survey”, Computer Networks, 38, 2002, pp. 393-422.

13. Dai, S, Jing, X, and Li, L, “Research and analysis on routing protocols for wireless sensor networks”, Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp.407-411.

14. Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., “A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks”,to appear in IEEE ICNEWS2006.

15. Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., “Security for Sensor Networks”, CADIP Research Symposium, 2002, available at,http://www.cs.sfu.ca/~angiez/personal/paper/sensor-ids.pdf.

16. Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, vol. 8, no.5, 2002, pp. 521-534

17. Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M., “A Low-Energy Key Management Protocol for Wireless Sensor Networks”, Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol.1, pp. 335 -340.

8. Rabaey, J.M., Ammer, J., Karalar, T., Suetfei Li., Otis, B., Sheets, M.,and Tuan, T., “PicoRadios for wireless sensor networks: the nextchallenge in ultra-low power design” 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7 Feb. 2002, pp. 200 –201