Mobility Investigate

Full Proof Secured Environment for Wireless Sensor Networks

Download now Free registration required

Executive Summary

Due to the technological innovations of sensor technologies, Wireless Sensor Networks (WSNs) have become very popular with its applications being used in many domains. The applications include those pertaining to civilian and military especially for monitoring environments. Out of all the interesting applications which are based on WSN, there are sensitive applications that need total security. This has to be understood from the standpoint that WSN lifetime is less due to resource constraints and controlling them personally is not feasible. This paper presents a new protocol that addresses some of the security threats prevailing in the arena of WSNs. The authors present a scheme and a protocol to prevent attacks such as distributed sensor cloning attack, man-in-the middle attack and replay attack.

  • Format: PDF
  • Size: 342.8 KB