Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks
Main Article Content
Abstract
Safe path-finding is extremely necessary for multihop wireless systems such as Wireless Sensor Networks. Multihop wireless systems are more unprotected to safety outbreaks as associated to single-stage wireless networks. Cross-layer design production is a precise significant character for wireless sensor Advanced security network is significant submissions. for the achievement of announcement among sensor nodes in wireless sensor network because the numbers composed is regularly less and the network is most vulnerable. Numerous Security methods have been suggested to deliver safety resolutions besides numerous threats to the Cross layer modification techniques in Wireless sensor networks. In this paper we overview the existing schemes for the security of cross-layer design in wireless sensor networks. The proposed Security model will provide more security between sensor nodes and the base station in wireless sensor network. Security is important for the success of the wireless sensor network because the data collected are often sensitive and the network is particularly vulnerable. In the cross-layer design, constraints are substituted between changed layers to protect the well-organized use of energy. In this paper, we propose a secure security model that is based on cross-layer design. It uses a cross layer optimization
Machine Reproduction consequences confirm that our proposed safety model better in many situations and in unpromising violence-disposed to the situation.
Article Details
References
1. Ameer Ahmed Abbasi, Mohamed Younis, “A survey on clustering algorithms for wireless sensor networks", Computer communication 30(2007)2826-28410.
2. J. N. Al-Karaki and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey”,IEEE Wireless Communication Vol.11, No.6, Dec.2004, pp. 6-28.
3. AmirSepasi Zahmati and Bahman Abolhassani, “EPMPLCS: An Efficient Power Management Protocol with Limited Cluster Size for Wireless Sensor Networks”, Proc. 27th International Conference on Distributed Computing Systems (ICDCS 2007), submitted for publication.
4. W. B. Heinzelman et al., “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Transactions on Wireless Communications Volume 1, No. 4, Oct 2002, pp.660 -670.
5. W. R. Heinemann, A. Chandrakasan, and H. Balkrishnan, “Energy-Efficient Communication Protocol for Wireless Micro sensor Networks”, in Proceedings of 33rd Hawaii International Conference on System Science, Vol. 2, Jan. 2000, pp.1-10.
6. Amir Sepasi Zahmati, Bahman Abolhassani,Ali Asghar Behesti Shirazi and Ali Shojaee Bakhtiari, ”AnEnergy-Efficient protocol with Static clustering for Wireless Sensor Network", proceedings of world academy of science, Engineering and Technology volume 22 July 2007 ISSN 1307-6884.
7. SoheilGhiasi, Ankur Srivastava, Xiaojian Yang, and Majid Sarrafzadeh, “Optimal Energy Aware Clustering in Sensor Networks”, SENSORS Journal, Vol. 2, No. 7, 2002, pp. 258-269.
8. DjallelEddineBoubiche, Sabrina Boubiche, AzeddineBilami, “ACross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs.”IEEE Communications Letters, Vol.19.No.5, May 2015.
9. Geethapriya Thamilarasu, Ramalingam Sridhar, ”Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks.”, Proc.IEEE 2007.
10. Pedro Pinto, Antonio Pinto, Manuel Ricardo, “Cross-Layer Admission Control to Enhance theSupport of Real-time Applications in WSN”, IEEE Sensors Journal, Vol.X.No.X, XX
11. Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33
12. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., “Wireless Sensor Networks: A Survey”, Computer Networks, 38, 2002, pp. 393-422.
13. Dai, S, Jing, X, and Li, L, “Research and analysis on routing protocols for wireless sensor networks”, Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp.407-411.
14. Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., “A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks”,to appear in IEEE ICNEWS2006.
15. Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., “Security for Sensor Networks”, CADIP Research Symposium, 2002, available at,http://www.cs.sfu.ca/~angiez/personal/paper/sensor-ids.pdf.
16. Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, vol. 8, no.5, 2002, pp. 521-534
17. Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M., “A Low-Energy Key Management Protocol for Wireless Sensor Networks”, Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol.1, pp. 335 -340.
8. Rabaey, J.M., Ammer, J., Karalar, T., Suetfei Li., Otis, B., Sheets, M.,and Tuan, T., “PicoRadios for wireless sensor networks: the nextchallenge in ultra-low power design” 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7 Feb. 2002, pp. 200 –201
