Proposing a Novel Algorithm to Improve Security in Wireless Sensor Networks Using Data Coding

Applications of Wireless Sensor Networks (WSNs) in industrial and consumer applications cause to get the attention of most researchers in this field. Besides these applications, security and reliability of WSN are extremely important, as important data can be conveyed securely from senders to receivers. Security and reliability in the WSNs always considers as a challenging issues. Several algorithms have been proposed to overcome the problem. However, the results are still not satisfactory. This paper proposes a new algorithm using coding theory to overcome the security and reliability problems in WSNs. The proposed algorithm uses minimum redundancy and optimal symbol allocation to ensure that the probability of successful data decoding is greater than or equal to a specified threshold. The experimental results show that the performance of proposed algorithm is much better when compared with other algorithms.

[1]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[2]  Wouter Joosen,et al.  Using Security Patterns to Combine Security Metrics , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[3]  S. Wicker Error Control Systems for Digital Communication and Storage , 1994 .

[4]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[5]  Zygmunt J. Haas,et al.  Analysis of multipath Routing-Part I: the effect on the packet delivery ratio , 2004, IEEE Transactions on Wireless Communications.

[6]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[7]  Viktor K. Prasanna,et al.  The Abstract Task Graph: a methodology for architecture-independent programming of networked sensor systems , 2005, EESR '05.

[8]  Kevin M. Stine,et al.  SP 800-55 Rev. 1. Performance Measurement Guide for Information Security , 2008 .

[9]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[10]  Frank Stajano Security in Pervasive Computing , 2003, SPC.

[11]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[12]  Kevin M. Stine,et al.  Performance Measurement Guide for Information Security , 2008 .

[13]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[14]  Yuichi Sei,et al.  Security software engineering in wireless sensor networks , 2008 .

[15]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[16]  Cecilia Mascolo,et al.  The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[17]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).