Open Access Open Access  Restricted Access Subscription or Fee Access

Data Security in a Distributed Wireless Network System

S. Beski Prabaharan, S. Senthil Murugan, K. Vivek, M. Velmurugan


In wireless network data transfer is a secure one, because the intruders may use duplicate IP addresses to hack the confidential data. Hop-by-hop authentication is necessary for secured communication. Hop-by-hop authentication is obtained by MAC address lookup table. The main goal of this work to protect contents of sensor data from attackers, including external intruders and unauthorized network users. For this purpose, we need to define and enforce a flexible access policy for each individual user based on the user’s role in the system. In particular, the access policy should be able to define a unique set of data that the user is authorized to access, and must be enforced via a cryptographic method since sensor nodes are vulnerable to strong attacks.


IP Address, Lookup Table, Authentication, Cryptographic Method

Full Text:



Shucheng Yu, Kui Ren Wenjing Lou, “FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, June, 2010.

S. Yu, K. Ren, and W. Lou, “FDAC: Toward Fine-Grained Distributed DataAccess Control in Wireless Sensor Networks,” Proc. IEEE INFOCOM, Apr. 2009.

Michal VARCHOLA, “Data Security in Wireless Sensor Networks– the Task for Public Key Cryptography”, Dept. of Electronics and Multimedia Communications, FEI TU of Koˇsice, Slovak Republic

I.F. Akyildiz and I.H. Kasimoglu, “Wireless Sensor and Actor Networks: Research Challenges,” Ad Hoc Networks, vol. 2, no. 4, pp. 351-367, Oct. 2004.

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-116, Aug. 2002.

C.-Y. Chong and S.P. Kumar, “Sensor Networks: Evolution, Opportunities and Challenges,” Proc. IEEE, vol. 91, no. 8, pp. 1247-1256, Aug. 2003.

A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, “Habitat Monitoring: Application Driver for Wireless Communications Technology,” Proc. ACM SIGCOMM Workshop Data Comm. in Latin Am. and the Caribbean, Apr. 2001.

D. Estrin, D. Culler, and K. Pister, “Connecting the Physical World with Pervasive Networks,” IEEE Pervasive Computing, vol. 1, no. 1, pp. 59-69, Jan.-Mar. 2002.

B. Thuraisingham, “Secure Sensor Information Management and Mining,” IEEE Signal Processing Magazine, vol. 21, no. 3, pp. 14-19, May 2004.

A. Banerjee, A. Mitra, W. Najjar, D. Zeinalipour-Yazti, V. Kalogeraki, and D. Gunopulos, “RISE Co-S: High Performance Sensor Storage and Co-Processing Architecture,” Proc. Second Ann. IEEE Comm. Soc. Conf. Sensor and Ad Hoc Comm. and Networks (SECON ’05), 2005.

A. Mitra, A. Banerjee, W. Najjar, D. Zeinalipour-Yazti, V. Kalogeraki, and D.Gunopulos, “High-Performance Low Power Sensor Platforms Featuring Gigabyte Scale Storage,” Proc. Ann IEEE/ACM Int’l Conf. Mobile and Ubiquitous Systems: Networking and Service (MobiQuitous ’05), 2005.

G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy, “Capsule: An Energy-Optimized Object Storage System for Memory-Constrained Sensor Devices,” Proc. ACM Conf. Embedded Networked Sensor Systems (Sensys), Nov. 2006.

D. Zeinalipour-Yazti, V. Kalogeraki, D. Gunopulos, A. Mitra, A. Banerjee, and W. Najjar, “Towards In-Situ Data Storage in Sensor Databases,” Proc. 10th Panhellenic Conf. Informatics (PCI ’05), pp. 36-46, 2005.

S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker, “GHT: A Geographic Hash Table for Data-Centric Storage,” Proc. Int’l Workshop Wireless Sensor Networks and Applications (WSNA ’02), Sept. 2002.

J. Newsome and D. Song, “GEM:Graph Embedding for Routing and Data-Centric Storage in Sensor Networks without Geographic Information,” Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys ’03), Nov. 2003.

J. Girao, D. Westhoff, E. Mykletun, and T. Araki, “Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks,” Ad Hoc Networks, vol. 5, no. 7, pp. 1073-1089, 2007.

R.D. Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, “Catch Me (If You Can): Data Survival in Unattended Sensor Networks,” Proc. Sixth Ann. IEEE Int’l Conf. Pervasive Computing and Comm. (PerCom ’08), Mar. 2008.

Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,” Proc. IEEE INFOCOM, Apr. 2009.

Kui Ren, Wenjing Lou, Yanchao Zhang, “LEDS: Providing Location-aware End-to-end Data Security in Wireless Sensor Networks”, IEEE transactions 2006


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.