Survey on Enhanced Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

-Recent developments on Wireless Sensor Networks have made their application in a wide range such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on. Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key predistribution schemes, The problem of authentication and pair wise key establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks. In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys are used authenticate and initiate data communication with sensor node.This article describes a threetier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Saurabh Bagchi,et al.  Efficient collection of sensor data in remote fields using mobile collectors , 2004, Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969).

[3]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[4]  Deborah Estrin,et al.  Intelligent fluid infrastructure for embedded networks , 2004, MobiSys '04.

[5]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[6]  Thomas F. La Porta,et al.  Data Dissemination with Ring-Based Index for Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[7]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[8]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[9]  A. Rasheed,et al.  An Energy-Efficient Hybrid Data Collection Scheme in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[10]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[11]  M. Welsh,et al.  Vital Signs Monitoring and Patient Tracking Over a Wireless Network , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[12]  Rabi N. Mahapatra,et al.  A key pre-distribution scheme for heterogeneous sensor networks , 2009, IWCMC.

[13]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..