Full Proof Secured Environment for Wireless Sensor Networks

Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are sensitive applications that need total security. This has to be understood from the standpoint that WSN lifetime is less due to resource constraints and controlling them personally is not feasible. This paper presents a new protocol that addresses some of the security threats prevailing in the arena of WSNs. The authors present a scheme and a protocol to prevent attacks such as distributed sensor cloning attack, man-in-the middle attack and replay attack.

Provided by: IOSR Journal of Engineering Topic: Mobility Date Added: Sep 2012 Format: PDF

Download Now

Find By Topic