Mobile Network Security and Privacy in WSN

Abstract This paper discuss the term threats, attacks and vulnerabilities in Wireless Sensor Networks followed by a model that relates the three entities. Based on the model, a framework of Trusted Wireless Sensor node is presented consisting of two major sections which are platform security enhancement and Trusted Authentication protocol to enhance sensor nodes security features and confirm the fidelity of node joining the network respectively. The design of the framework is in line with Trusted Computing Group specifications toward trusted platform implementation. Finally, brief analysis on the proposed framework is presented.

[1]  A. Praveena Achieving data security in wireless sensor networks using ultra encryption standard version — IV algorithm , 2017, 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT).

[2]  Shanta Chowdhury,et al.  An efficient security architecture for Wireless Sensor Networks using pseudo-inverse matrix , 2015, 2015 18th International Conference on Computer and Information Technology (ICCIT).

[3]  S. Anbuchelian,et al.  Improving security in Wireless Sensor Network using trust and metaheuristic algorithms , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).

[4]  Sanjeet Kumar,et al.  A survey of security in wireless sensor networks , 2015, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).

[5]  Bo Cheng,et al.  Public key cryptography: Feasible for security in modern personal area sensor networks? , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).

[6]  E. Brumancia,et al.  A profile based scheme for security in clustered wireless sensor networks , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[7]  Aiqun Hu,et al.  Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[8]  Ausif Mahmood,et al.  A specialized event-driven network simulator for security and anonymity applications of Wireless Sensor Networks , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[9]  Benfilali Mostefa,et al.  A survey of wireless sensor network security in the context of Internet of Things , 2017, 2017 4th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM).

[10]  Alan F. Smeaton,et al.  Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..

[11]  Babak D. Beheshti A framework for Wireless Sensor Network security , 2016, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[12]  Daniel D. Anita,et al.  A review on existing security frameworks with efficient energy preservation techniques in Wireless Sensor Networks , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[13]  L. Hunt,et al.  Energy Demand and Energy Efficiency in the OECD Countries: A Stochastic Demand Frontier Approach , 2011 .

[14]  Yang Xiaomei,et al.  Evolution of wireless sensor network security , 2016, 2016 World Automation Congress (WAC).

[15]  Christos G. Cassandras,et al.  Energy-Based Lifetime Maximization and Security of Wireless-Sensor Networks With General Nonideal Battery Models , 2017, IEEE Transactions on Control of Network Systems.