International Journals of Advanced Information Science and Technology (IJAIST)
Wireless sensor networks are essentially difficult to secure with the pre-key distribution or certificate flags. Using pair wise key distribution and authentication between the sensor nodes, an attacker can easily get a large number of key matches and gain control by network arranging with some compromised keys. The context has two separate key pools, mobile sink for access the network, another for pair-wise key distribution between the sensors. To reduce the damages caused by access node replication attacks with pair key distribution, the authors have reinforced the authentication mechanism with the secure K-top query processing performed on the time-slot sensing data set in three tier sensor network, and establish a set of privacy and correctness requirements for such a secure top-k query scheme to become a reality.