Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks

Main Article Content

Abstract

Safe path-finding is extremely necessary for multihop wireless systems such as Wireless Sensor  Networks. Multihop wireless systems are more  unprotected to safety outbreaks as associated to  single-stage wireless networks. Cross-layer design  production is a precise significant character for  wireless  sensor  Advanced security  network  is  significant  submissions.  for  the  achievement of announcement among sensor  nodes in wireless sensor network because the  numbers composed is regularly less and the  network is most vulnerable. Numerous Security  methods have been suggested to deliver safety  resolutions besides numerous threats to the Cross layer modification techniques in Wireless sensor  networks. In this paper we overview the existing  schemes for the security of cross-layer design in  wireless sensor networks. The proposed Security  model will provide more security between sensor  nodes and the base station in wireless sensor  network. Security is important for the success of  the wireless sensor network because the data  collected are often sensitive and the network is  particularly vulnerable. In the cross-layer design,  constraints are substituted between changed  layers to protect the well-organized use of energy.  In this paper, we propose a secure security model that is based on cross-layer design. It uses a cross layer optimization

Machine Reproduction consequences confirm that our proposed safety  model better in many situations and in  unpromising violence-disposed to the situation.

Article Details

Author Biographies

Rakesh Kumar Saini, Department of Computer Science and Application, DIT University, Dehradun Uttrakhand, India

Dr.Rakesh Kumar Saini received the MCA degree from UPTU, Lucknow, India in 2005 and M.Tech (Computer Science and Engineering) degree from UTU, Dehradun, India in 2012 and PhD from DIT University, Dehradun, India in 2017. He is having more than 14 Years of teaching experience. He is author of around 10 books. His research interests include cross-layer modification, Energy-Efficiency and water quality monitoring in Wireless Sensor Network.

Naveen Kumar, Department of Computer Science & Engineering, DITUniversity, Dehradun Uttrakhand, India

Mr. Naveen Kumar, Assistant Professor in Department of Computer Science and Engineering. At DIT university Dehradun (U.K.).He is having 12 Year + teaching and research experience. The Research Area is Wireless Sensor Network and Data Mining. 

References

1. Ameer Ahmed Abbasi, Mohamed Younis, “A survey on clustering algorithms for wireless sensor networks", Computer communication 30(2007)2826-28410.

2. J. N. Al-Karaki and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey”,IEEE Wireless Communication Vol.11, No.6, Dec.2004, pp. 6-28.

3. AmirSepasi Zahmati and Bahman Abolhassani, “EPMPLCS: An Efficient Power Management Protocol with Limited Cluster Size for Wireless Sensor Networks”, Proc. 27th International Conference on Distributed Computing Systems (ICDCS 2007), submitted for publication.

4. W. B. Heinzelman et al., “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Transactions on Wireless Communications Volume 1, No. 4, Oct 2002, pp.660 -670.

5. W. R. Heinemann, A. Chandrakasan, and H. Balkrishnan, “Energy-Efficient Communication Protocol for Wireless Micro sensor Networks”, in Proceedings of 33rd Hawaii International Conference on System Science, Vol. 2, Jan. 2000, pp.1-10.

6. Amir Sepasi Zahmati, Bahman Abolhassani,Ali Asghar Behesti Shirazi and Ali Shojaee Bakhtiari, ”AnEnergy-Efficient protocol with Static clustering for Wireless Sensor Network", proceedings of world academy of science, Engineering and Technology volume 22 July 2007 ISSN 1307-6884.

7. SoheilGhiasi, Ankur Srivastava, Xiaojian Yang, and Majid Sarrafzadeh, “Optimal Energy Aware Clustering in Sensor Networks”, SENSORS Journal, Vol. 2, No. 7, 2002, pp. 258-269.

8. DjallelEddineBoubiche, Sabrina Boubiche, AzeddineBilami, “ACross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs.”IEEE Communications Letters, Vol.19.No.5, May 2015.

9. Geethapriya Thamilarasu, Ramalingam Sridhar, ”Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks.”, Proc.IEEE 2007.

10. Pedro Pinto, Antonio Pinto, Manuel Ricardo, “Cross-Layer Admission Control to Enhance theSupport of Real-time Applications in WSN”, IEEE Sensors Journal, Vol.X.No.X, XX

11. Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33

12. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., “Wireless Sensor Networks: A Survey”, Computer Networks, 38, 2002, pp. 393-422.

13. Dai, S, Jing, X, and Li, L, “Research and analysis on routing protocols for wireless sensor networks”, Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp.407-411.

14. Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., “A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks”,to appear in IEEE ICNEWS2006.

15. Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., “Security for Sensor Networks”, CADIP Research Symposium, 2002, available at,http://www.cs.sfu.ca/~angiez/personal/paper/sensor-ids.pdf.

16. Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, vol. 8, no.5, 2002, pp. 521-534

17. Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M., “A Low-Energy Key Management Protocol for Wireless Sensor Networks”, Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol.1, pp. 335 -340.

8. Rabaey, J.M., Ammer, J., Karalar, T., Suetfei Li., Otis, B., Sheets, M.,and Tuan, T., “PicoRadios for wireless sensor networks: the nextchallenge in ultra-low power design” 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7 Feb. 2002, pp. 200 –201