Open Access Open Access  Restricted Access Subscription or Fee Access

Secure and Scalable Sensor Data Access Network with Delay Tolerance

P. Saranya, Dr. R. S. Ponmagal

Abstract


One of the open problems in (Wireless Sensor Networks) WSN environment is security of sensor data. It is due to malicious nodes. In WSN environment there is no continuous network connectivity. The possibility of messages being successfully transmitted is very limited. In this paper a design was developed to validate a dynamic trust management (DTM) using two way handshaking for secure optimization in WSN environment. The generated data of WSN is to be collected in a secure, efficient and scalable manner if the information is lost then there is no need for the source to transmit the message again. During the transfer of packets from one node to another there is intermediate node storage facility which allows the packet information to be stored in previous node itself. This will facilitate the packets to be send without any loss of data in WSN.The privacy preservation of the data will also be ensured. And this will improve the overall security of the proposed system.

Keywords


Design and Validation, Dynamic Trust Management, Sensor Data, Wireless Sensor Networks.

Full Text:

PDF

References


Suleyman Uludag, King-Shan Lui, Wenyu Ren and Klara Nahrstedt, (2015),’Secure and Scalable Data Collection with Time Minimization in the Smart Grid,’ IEEE transaction on smart grid, vol.7.

Theodore Zahariadis, Helen Leligou, Panagiotis Karkazis, Panagiotis Trakadas, Ioannis Papaefstathiou, Charalambos Vangelatos, Lionel Besson,(2010),’Design and Implementation of a Trust-Aware Routing Protocol For Large WSN,’in International Journal Of Network Security & Its Applications (IJNSA), vol.2,no.3,pp.123-143.

Ling Liu, Weisong Shi, (2010),’Trust and Reputation management,’ in IEEE Internet Computing, pp.1089-7801.

Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, and Athanasios V. Vasilakos,(2012),’ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks,” in IEEE transactions on information technology in biomedicine, vol. 16, no. 4, pp.623-632.

Mrs. Suvarna L. Kattimani, Mr.Jaeerahmad N.Indikar,(2015),’ Dynamic Trust and Security Management Protocol For Delay Tolerant Networks using Information centric-Networks Architecture, ‘in International Journal of Engineering and Computer Science,vol.4,pp.12698-12704.

Chi-Jen Wu, Jan-Ming Ho, Ming Syan Chen, (2013),’ A Scalable Server Architecture for Mobile Presence Services in Social Network Applications,’IEEE Transactions on Mobile Computing vol.12 no: 2.

Mingjun Xiao, Jie Wu and Liusheng Huang,(2013),’Community-Aware Opportunistic Routing in Mobile Social Networks,’IEEE Transactions on Computers, pp.99.

N. Kayastha, D. Niyato, E. Hossain, and Z. Han, (2012), ‘Smart grid sensor data collection, communication, and networking: A tutorial, ‘Wireless Commun. Mobile Computer, vol. 14, no. 11, pp. 1055–1087.

Nithin Michael and Ao Tang, (2014),’HALO: Hop-by-Hop Adaptive Link-State Optimal Routing,’IEEE Transactions on Networking, 10 September.

Fatme El-Moukaddem, Eric Torng, Guoliang Xing,(2013),’ Mobile Relay Configuration in Data-intensive Wireless Sensor Networks,’IEEE Transactions On Mobile Computing vol.12 no: 2.

R. Tabassum, K. Nahrstedt, E. Rogers, and K.S. Lui, (2013),’SCAPACH: Scalable password-changing protocol for smart grid device authentication,’ in Proc. 22nd Int. Conf. Comput. Commun. Netw. Nassau, the Bahamas, pp. 1–5.

Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia, (2014),’Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker’s Impact,’IEEE Transactions on Information Forensic and Security vol. 9 no: 4.

Haiying Shen, Ze Li, Yuhua Lin and Jin Li, (2014),’Social Tube: P2P-assisted Video Sharing in Online Social Networks,’IEEE Transactions on Parallel and Distributed Systems, pp. 99.

Basel Alomair, Andrew Clark, Jorge Cuellary, and Radha Poovendran, (2013),’Towards a Statistical Framework for Source Anonymity in Sensor Networks,’IEEE Transactions on Mobile Computing, vol.12.

Xiaoyong Li, Feng Zhou and JunpingDu, (2013), `LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks’, in IEEE transactions on information forensics and security, pp451-551.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.