The Privacy and Trust for Wireless Network Security Proposal Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Abstract

Wireless sensor networks are limited in resources to accommodate traditional complex security solutions. The limitations and lack of a secure framework for the WSN makes the networks nodes vulnerable to attacks from a hostile network.

Attacks such as to DoS attacks, eavesdropping, message tempering, sinkhole, wormhole, and Sybil attacks exploit the security holes in the network compromising the integrity of the network.

The proposed project is to design a completely secure wireless sensor network by integrating appropriate security solutions to each node in the network using triple key management techniques security solutions.

Among the techniques include integrating a random key pre-distribution technique which functions on a probabilistic model to create a secure connection between nodes.

The limitation with this technique can be overcome by is to integrating multiple security solutions to overcome the disadvantage of limited key storage space.

Additional techniques integrated into the security solution include the master key based scheme which functions on a symmetric key, and a hierarchical key based scheme, which enables each of the nodes in the network to generate cryptographic keys for key authentication purposes.

A complete security solution is based on a triple key management technique for a complete and secure network communication.

Introduction

Nodes in a wireless sensor network (WSN) have high threat and risk exposures from external sources because the nodes are resource staffed, and cannot accommodate the use of secure traditional network security solutions (Undercoffer, Ayancha, Joshi, Pinkston 2004, p. 260).

Limited resources include memory constrains, limited computational capabilities, low energy storage capabilities, low data bandwidth, and limited transmission ranges (Hancke & Leuschner 2007, p.45).

That makes WSNs vulnerable to DoS attacks, eavesdropping, message tempering, sinkhole, wormhole, and Sybil attacks leading to loss of privacy and security.

The traditional data encryption techniques and complex algorithms cannot be applied, compelling the use of a multi-level protocol security framework desirable (Poornima & Amberker 2009, p. 5-17; Sharma, Ghosh & Ghose 2010, p.50; Perrig, Szewczyk, Wen, Culler & Tygar 2011, p.96).

To achieve complete security solutions to enforce network privacy, this paper proposes an integrated security solution at each node in the wireless sensor network by focusing on the network and link layers (Ibriq & Mahgoub 2007, p.211; Biradar & Patil, 2011, p.15).

Problem Statement

A complete security solution can be designed into Wireless sensor networks (WSN) which are vulnerable to attacks because traditional network solutions cannot be accommodated by the resource limited nodes.

Aim

The aim of this project is to design and implement a completely secure wireless sensor network into each node of the wireless sensor network.

Objectives

  1. To implement security into each node of the wireless sensor network based on a secure routing protocol.
  2. Integrate the concept of secure key management.
  3. To integrate the security solution based on a Secure and Hierarchical, a Routing protocol (SHARP).

Expectations

The outcome of the project is to attain a completely secure wireless sensor network (WSN) with hierarchically linked nodes in a cluster topology using a “Secure and Hierarchical, a Routing Protocol-SHARP” protocol.

Significance of the Study

The significance of this project is to provide complete security solutions to multiple nodes that are interconnected in a wireless sensor network to enforce privacy and ensure data integrity, availability, and confidentiality in the transmission, at minimum power consumption.

Wireless networks are vulnerable to sinkholes attacks, eavesdropping, denial of service attacks, and message tampering, in addition to undiscovered dynamically evolving attacks. This project provides a security solution to the WSN to enforce system integrity.

Theoretical Framework

The basis of the theoretical framework is the graph theory where the vertices of the WSN are represented by the sensors and nodes and the edges represent wireless channels to solve the common graph routing problems (Kaplantzis 2006, p. 19).

Literature Review

A secure WSN enforces data integrity through cryptographic schemes using secure key management techniques integrated into the security architecture of the wireless network.

Some of the key management techniques security based solutions include random key pre-distribution technique that relies on probabilistic model to establish connection between nodes in a network (Du, Xiao, Guizani & Chen, 2007, p.25). The disadvantage is a lot of space for storing a large number of keys.

The master key based scheme functions on symmetric key, but with a key distribution problem, leading to pre-deployment overheads and non-scalability. The hierarchical key based scheme, enables any node to generate cryptographic key for node authentication (Gautam, Lee, Pyun, Jae-Young 2009, p. 120).

The scheme enables sensor nodes to detect compromised nodes in the network, which is then disallowed to participate in the network.

Here, the security solution for single node relies on key deployment, authentication, and encryption, secure pre-key distribution mechanism consolidated into a triple key management security solution, using a base station to divide the network into sectors and tracks (Zhou, Fang & Zhang, 2008, p12; Zia & Zomaya 2006, p.11).

Methodology

The project will be started by analyzing the literature on random key distribution and management schemes, WSN secure routing protocols, secure key management schemes, and the use of SHARP to design and implement a secure wireless sensor network (Anurag, Rathor, Biradar & Ghose 2010, p.580).

A network diagram will be drawn detailing network clusters, the base station, and the nodes. Vulnerabilities, threats, and responsibility of each cluster and nodes and the security solutions in the design phases will be assessed.

The project output will demonstrate the attainment of node to node, node to cluster, node to cluster head, node to base station, node to routing cluster head, and data cluster heads secure communication (Boyle & Newe 2008, p.67).

Project Plan

Project planDetails
Project purposeDesign a completely secure wireless sensor network.
Project objectivesIdentify and align with project goals
Related LiteratureIdentify and analyze wireless sensor network related literature.
Roles and responsibilities (Student)A. Identify tools and technologies
B. Design network
C. Implement
AssumptionsDevelop assumptions
DeploymentDeploy

Project timeline

WeeksPlanExplaining Project purposeSetting Aims and ObjectivesRevisionLiterature ReviewIdentify tools and technologiesNetwork designImplementation & testingReport (Presentation)
1++
2++
3+
4++
5+
6+
7+
8+
9+
10+
11+
12+
13+

References

Anurag, K S, Rathor, S. Biradar, S R & Ghose M K 2010, ‘Power-efficient Routing & Increased Yield Approach for WSNs ‘,Varshney, P K 2006International Journal on Computer Science and Engineering (IJCSE),vol. 02, no. 03, pp. 586-592.

Biradar, R V & Patil, V C 2011, Special Issue on Ubiquitous Computing Security Systems‖, UbiCC Journal, vol. 4, no.1, pp.15.

Boyle, D & Newe,” T 2008, ‘Securing Wireless Sensor Networks: security Architectures’, Journal of Networks, vol 3,no. 1, pp 65-77.

Du, W, Deng, J, Han, Y S & , A key predistribution scheme for sensor networks using deployment knowledge, IEEE Transactions on Dependable and Secure Computing, Vol. 3, issue 1, pp.62-77.

Du, X, Xiao, Y Guizani,M & Chen, HH 2007 “Effective key management for sensor networks, an effective key management scheme for heterogeneous sensor networks”, Ad Hoc Networks, vol. 5, Issue 1, pp. 24-34.

Gautam, N, Lee, W, Pyun, Jae-Young 2009, “Track-Sector Clustering for Energy Efficient Routing in Wireless Sensor Networks,” International Conference on Computer and Information Technology cit, vol. 2, no. 1, pp.116-121.

Hancke, G P & Leuschner, CJ 2007, SEER : a simple energy efficient routing protocol for wireless sensor networks‖, South African Computer Journal, vol. 39, pp. 45.

Ibriq, J & Mahgoub, I 2007, ‘A Hierarchical Key Establishment Scheme for Wireless Sensor Networks’. 21st International Conference on Advanced Networking and Applications, vol. 1, no.1, pp. 210-219.

Kaplantzis, S 2006, Security Models for Wireless Sensor Networks. Web.

Perrig, A, Szewczyk, R, Wen,V, Culler, D & Tygar, J D 2011, Spins: Security protocols for sensor networks. Wireless Networks, 8:521 – 534, 2002. International Journal of Computer Science and Security (IJCSS), vol. 5, Issue 1, pp. 96.

Poornima, A S & Amberker, B B 2009, ‘Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks”, International Journal of Recent Trends in Engineering, vol 1, no. 1, pp. 5-17.

Sharma,K, Ghosh, S K & Ghose, M K. 2010, ‘Establishing an Integrated Secure Wireless Sensor Network System: A New Approach’, International Journal of Next Generation Networks ( IJNGN), vol. 1, no. 1, pp.12-60.

Undercoffer, J, Ayancha, S, Joshi, A., Pinkston, J 2004, ‘Security for Wireless Sensor Networks’, Wireless Sensor Networks, Kluwer Academic Publishers Norwell, USA, vol. 1, no.1, pp. 253- 275.

Zia, T.A & Zomaya, AY 2006, ‘A Secure Triple-Key Management Scheme for wireless sensor networks’, in the proceedings of INFOCOM 2006 ,25th IEEE, International Conference on Communications, Barcelona,vol. 1, no.1, pp1-2 ,23-29.

Zhou, Y, Fang, Y & Zhang, Y 2008, ‘A survey of Securing Wireless Sensor network’. IEEE communication surveys, vol. 10, no. 3, pp. 6-28.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, July 2). The Privacy and Trust for Wireless Network Security. https://ivypanda.com/essays/the-privacy-and-trust-for-wireless-network-security/

Work Cited

"The Privacy and Trust for Wireless Network Security." IvyPanda, 2 July 2019, ivypanda.com/essays/the-privacy-and-trust-for-wireless-network-security/.

References

IvyPanda. (2019) 'The Privacy and Trust for Wireless Network Security'. 2 July.

References

IvyPanda. 2019. "The Privacy and Trust for Wireless Network Security." July 2, 2019. https://ivypanda.com/essays/the-privacy-and-trust-for-wireless-network-security/.

1. IvyPanda. "The Privacy and Trust for Wireless Network Security." July 2, 2019. https://ivypanda.com/essays/the-privacy-and-trust-for-wireless-network-security/.


Bibliography


IvyPanda. "The Privacy and Trust for Wireless Network Security." July 2, 2019. https://ivypanda.com/essays/the-privacy-and-trust-for-wireless-network-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1