Data Security in WSN Research Papers (original) (raw)

Cloud computing is one of the today’s most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility... more

Cloud computing is one of the today’s most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility and scalability. A major feature of the cloud services is that user’s data are usually processed remotely in unknown machines. Though there are many conveniences brought by this new technology, there are some issues such as cloud computing servers can be easily compromised, data is no longer under the control of the data owner and cloud computing is not responsible for the access control of outsourced data desired by the data owner. To address these problems, we propose a new framework known as Secure Flexible Framework (SFF). This proposed framework allows data owner to achieve cloud data integrity, actual data usage tracking and fine grained access control of outsourced data. Through this paper, we strengthen the correctness and user’s control of th...

Cloud computing is one of the today's most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility... more

Cloud computing is one of the today's most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility and scalability. A major feature of the cloud services is that user's data are usually processed remotely in unknown machines. Though there are many conveniences brought by this new technology, there are some issues such as cloud computing servers can be easily compromised, data is no longer under the control of the data owner and cloud computing is not responsible for the access control of outsourced data desired by the data owner. To address these problems, we propose a new framework known as Secure Flexible Framework (SFF). This proposed framework allows data owner to achieve cloud data integrity, actual data usage tracking and fine grained access control of outsourced data. Through this paper, we strengthen the correctness and user's control of their own data in the cloud along with scalable, flexible and fine grained access control of outsourced data.

Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes... more

Cryptography technique is used to provide data security. In existing cryptography technique the key generation takes place randomly. Key generation require shared key. If shared key is access by unauthorized user then security becomes disoriented. Hence existing problems are alleviated to give more security to data. In proposed system a algorithm called as Elliptic Curve Cryptography is used. The ECC generates the key by using the point on the curve. The ECC is used for generating the key by using point on the curve and encryption and decryption operation takes place through curve. In the proposed system the encryption and key generation process takes place rapidly.

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying... more

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on the network's type and protocol's operation. Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have not been designed with security requirements in mind. However, taking into consideration that WSN applications need to support critical infrastructures (i.e., military, healthcare, environmental, etc.), security becomes an issue. And since these infrastructures are highly depended on the availability of resources, focus has especially been given to support a secure, resilient and reliable environment, with multipath routing being one of the added functionalities. The need for security in sensitive WSN application has lead researchers to design secure multipath routing protocols from the beginning or design security extensions for existing protocols. This paper surveys the current state-of-the-art of secure multipath routing protocols in WSNs, classifies the protocols in categories according to their security-related operational objectives, defines a new threat model in the routing procedure and identifies open research issues in the area.

Many Wireless Sensor Networks (WSNs) applications are new and their requirements may not be fully anticipated during the sensor networks design and development stage. We are presenting a sensor network infrastructure that support motes'... more

Many Wireless Sensor Networks (WSNs) applications are new and their requirements may not be fully anticipated during the sensor networks design and development stage. We are presenting a sensor network infrastructure that support motes' with remote hardware and software modification to match the target applications need. Using the proposed infrastructure in next-generation WSNs will produce flexible infrastructures that will provide over-the-air remote design modification even after the deployment of WSNs on the sensing field. In this paper, we are presenting the design concept and challenges of such infrastructure. Also, we present the use of the infrastructure in one possible environmental monitoring application such as forest fire. The development of such infrastructure will have an impact on advances the research on the real-time remote sensing, heterogeneous WSN, and WSNs applications.

Cloud computing is one of the today's most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility... more

Cloud computing is one of the today's most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility and scalability. A major feature of the cloud services is that user's data are usually processed remotely in unknown machines. Though there are many conveniences brought by this new technology, there are some issues such as cloud computing servers can be easily compromised, data is no longer under the control of the data owner and cloud computing is not responsible for the access control of outsourced data desired by the data owner. To address these problems, we propose a new framework known as Secure Flexible Framework (SFF). This proposed framework allows data owner to achieve cloud data integrity, actual data usage tracking and fine grained access control of outsourced data. Through this paper, we strengthen the correctness and user's control of their own data in the cloud along with scalable, flexible and fine grained access control of outsourced data.

Steganography is one of the branches of information security field, it aims to hide information in unremarkable cover media so as not to arouse an eavesdropper's suspicion. The secret message is hidden in such a way that no significant... more

Steganography is one of the branches of information security field, it aims to hide information in unremarkable cover media so as not to arouse an eavesdropper's suspicion. The secret message is hidden in such a way that no significant degradation can be detected in the quality of the original image. The aim of this paper is to introduce an efficient steganographic scheme to hide data over gray scale images. This scheme is based on the property of the human eye, which is more sensitive to the change in the smooth area than the edge area using pixel value difference, besides employing the LSB substitution technique as a fundamental stage. The experimental results show that the proposed method could successfully achieve the goals of the high embedding capacity and maintaining the visual quality, in addition, provides more secure data hiding using selective pixel positions determined by a secret image (i.e. key). Moreover, based on that, the secret message is replaced with dynamic LSBs, our scheme can effectively resist several image steganalysis techniques.

Cloud computing is one of the today's most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility... more

Cloud computing is one of the today's most exciting technologies due to its abilities like ensuring scalable services, reducing the burden of local hardware and software management associated with computing while increasing flexibility and scalability. A major feature of the cloud services is that user's data are usually processed remotely in unknown machines. Though there are many conveniences brought by this new technology, there are some issues such as cloud computing servers can be easily compromised, data is no longer under the control of the data owner and cloud computing is not responsible for the access control of outsourced data desired by the data owner. To address these problems, we propose a new framework known as Secure Flexible Framework (SFF). This proposed framework allows data owner to achieve cloud data integrity, actual data usage tracking and fine grained access control of outsourced data. Through this paper, we strengthen the correctness and user's control of their own data in the cloud along with scalable, flexible and fine grained access control of outsourced data.

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying... more

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on the network"s type and protocol"s operation. Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have not been designed with security requirements in mind. However, taking into consideration that WSN applications need to support critical infrastructures (i.e. military, healthcare, environmental etc), security becomes an issue. And since these infrastructures are highly depended on the availability of resources, focus has especially been given to support a secure, resilient and reliable environment, with multipath routing being one of the added functionalities. The need for security in sensitive WSN application has lead researchers to design secure multipath routing protocols from the beginning or design security extensions for existing protocols. This paper surveys the current state-of-the-art of secure multipath routing protocols in WSNs, classifies the protocols in categories according to their security-related operational objectives, defines a new threat model in the routing procedure and identifies open research issues in the area.

Image Steganography is a thriving researcharea of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least... more

Image Steganography is a thriving researcharea of information security where secret
data is embedded in images to hide its existence while getting the minimum possible statistical
detectability. This paper proposes a novel magic least significant bit substitution method (M-LSBSM) for RGB images. The proposed method is based on the achromatic component (I-plane) of
the hue-saturation-intensity (HSI) color model and multi-level encryption (MLE) in the spatial
domain. The input image is transposed and converted into an HSI color space. The I-plane is
divided into four sub-images of equal size, rotating each sub-image with a different angle using a
secret key. The secret information is divided intofour blocks, which are then encrypted using an
MLE algorithm (MLEA). Each sub-block of the message is embedded into one of the rotated subimages based on a specific pattern using magic LSB substitution. Experimental results validate that
the proposed method not only enhances the visual quality of stego images but also provides good
imperceptibility and multiple security levels as compared to several existing prominent methods.

WSNs have large number of applications. For example, military and civil applications are using WSNs in various manners such as imaging of target field, detecting intrusions, monitoring weather, distributed computing, security and tactical... more

WSNs have large number of applications. For example, military and civil applications are using WSNs in various manners such as imaging of target field, detecting intrusions, monitoring weather, distributed computing, security and tactical surveillance, identifying environmental and surrounding conditions like sound, temperature, movement and light etc. WSNs have recently emerged as a technology that affects human life in various manners with its applications. WSNs are mostly deployed in hostile environment and remain unguarded. This attracts an attacker to capture or to make compromise a node physically. This can be done by modifying its code and attaining its secretive info like cryptographic keys. WSNs are more susceptible to network attacks like sniffing attack, spoofing etc. which can change the procedure of WSN and hence the very resolution of their positioning gets defeated. This paper presents an overview of different security vulnerabilities in WSN.

This work focuses on the development of relatively simple, low cost, autonomous and feasible wireless sensor network and related embedded system combination to be integrated with AMATEUR UAV and unmanned ground vehicle (UGV) management... more

This work focuses on the development of relatively
simple, low cost, autonomous and feasible wireless sensor
network and related embedded system combination to be
integrated with AMATEUR UAV and unmanned ground vehicle
(UGV) management system both at inter and intra level
communication and networking for different modules and
different vehicles. What we describe here is our progress in a
ongoing live project. We also make fresh implementable
proposals to integrate autonomous Amateur UAV and share
plans to implement it for vehicle management system using
intelligent communication and networked system approach. We
envision the capability of modern sensing network where
communication between different sensors and embedded system combination enable user to have a closer view over larger area and provide potent capability of acting autonomously.

A recent research thread focused on Unattended Wireless Sensor Networks (UWSNs), that are characterized by the intermittent presence of the sink. An adversary can take advantage of this behavior trying to erase a piece of information... more

A recent research thread focused on Unattended Wireless Sensor Networks (UWSNs), that are characterized by the intermittent presence of the sink. An adversary can take advantage of this behavior trying to erase a piece of information sensed by the network before the sink collects it. Therefore, without a mechanism in place to assure data availability, the sink will not ever know that a datum has been compromised. In this paper, we adopt data replication to assure data survivability in UWSNs. In particular, we revisit an epidemic model and show that, even if the data replication process can be modelled as the spreading of a disease in a finite population, new problems that have not been discovered before arise: optimal parameters choice for the model do not assure the intended data survivability. The problem is complicated by the fact that it is driven by two conflicting parameters: On the one hand the flooding of the datum has to be avoided-due to the sensor resource constraints-, while on the other hand data survivability depends on the data replication rate. Using advanced probabilistic tools we achieve a theoretically sound result that assures at the same time: Data survivability, an optimal usage of sensors resources, and a fast and predictable collecting time. These results have been achieved in both the full visibility and the geometrical model. Finally, extensive simulation results support our findings.

This work focuses on the development of relatively simple, low cost, autonomous and feasible wireless sensor network and related embedded system combination to be integrated with AMATEUR UAV and unmanned ground vehicle (UGV) management... more

This work focuses on the development of relatively simple, low cost, autonomous and feasible wireless sensor network and related embedded system combination to be integrated with AMATEUR UAV and unmanned ground vehicle (UGV) management system both at inter and intra level communication and networking for different modules and different vehicles. What we describe here is our progress in a ongoing live project. We also make fresh implementable proposals to integrate autonomous Amateur UAV and share plans to implement it for vehicle management system using intelligent communication and networked system approach. We envision the capability of modern sensing network where communication between different sensors and embedded system combination enable user to have a closer view over larger area and provide potent capability of acting autonomously.

Recently, the applications scope of Wireless Sensor Networks (WSNs) has been broadened. WSN communication security is important because sensor nodes are vulnerable to various security attacks when deployed in an open environment. An... more

Recently, the applications scope of Wireless Sensor Networks (WSNs) has been broadened. WSN communication security is important because sensor nodes are vulnerable to various security attacks when deployed in an open environment. An adversary could exploit this vulnerability to inject false reports into the network. En-route filtering techniques have been researched to block false reports. The CFFS scheme filters the false report by collaboratively validating the report by clustering the nodes. However, CFFS is not considered effective against repetitive attacks. Repeated attacks have a significant impact on network lifetime. In this paper, we propose a method to detect repetitive attacks with cluster-based false data filtering and to identify the compromised nodes and quickly block them. The proposed scheme uses fuzzy logic to determine the distribution of additional keys according to the network conditions, thereby improving energy efficiency.

Low power and limited processing are characteristics of nodes in Wireless sensor networks. Therefore, optimal consumption of energy for WSN protocols seems essential. In a number of WSN applications, sensor nodes sense data periodically... more

Low power and limited processing are characteristics of nodes in Wireless sensor networks. Therefore, optimal
consumption of energy for WSN protocols seems essential. In a number of WSN applications, sensor nodes sense data
periodically from environment and transfer it to the sink. Because of limitation in energy and selection of best route,
for the purpose of increasing network remaining energy a node with most energy level will be used for transmission
of data. The most part of energy in nodes is wasted on radio transmission; thus decreasing number of transferred
packets in the network will result in increase in node and network lifetimes. In algorithms introduced for data
transmission in such networks up to now, a single route is used for data transmissions that results in decrease in
energy of nodes located on this route which in turn results in increasing of remaining energy. In this paper a new
method is proposed for selection of data transmission route that is able to solve this problem. This method is based
on learning automata that selects the route with regard to energy parameters and the distance to sink. In this method
energy of network nodes finishes rather simultaneously preventing break down of network into two separate parts.
This will result in increased lifetime. Simulation results show that this method has been very effective in increasing of
remaining energy and it increases network lifetime.

In the course of earth evolution, there has been significant development related to human race. However, right from the Stone Age to the mobile age, the development is with respect to human beings only, his progress for making a... more

In the course of earth evolution, there has been significant development related to human race. However, right from the Stone Age to the mobile age, the development is with respect to human beings only, his progress for making a comfortable life. Technology can help the animals and plants for their identification, monitoring and studying their behaviour pattern. Use of technology for Wildlife monitoring is a boon provided by the advances in the research; however extensive use of it may prove as a hindrance to the animal behaviour. The data gathered by Wildlife monitoring can be used for number of purposes viz visualisation, analysis, interpretation, prediction etc using various algorithms and tools. The paper is designed to study the role of Information technology and study various tools and strategies for their efficient Habitat monitoring

Wireless Sensor Networks (WSN) is now widely used in precision agriculture applications. Sensors play an important role in WSN. The traditional humidity sensors employed in the agriculture have a drawback that they acquire a large amount... more

Wireless Sensor Networks (WSN) is now widely used in precision agriculture applications. Sensors play an important role in WSN. The traditional humidity sensors employed in the agriculture have a drawback that they acquire a large amount of data which is to be transmitted or processed. Whereas the intelligent sensor proposed in this paper uses a conventional sensor and an embedded processor that can process the data acquired using algorithms to reduce the amount of data collected, to extract only relevant information and to present this information in a format which minimizes post-processing latency. As a result of which the final processing end has to perform a little computation that too only on features (like significant changes in humidity) rather on the huge data hence reducing the power consumption. The intelligent humidity sensor reduces the amount of data processed by 50% (depending upon humidity variations) and thereby also reducing the power consumption.

Low power and limited processing are characteristics of nodes in Wireless sensor networks. Therefore, optimal consumption of energy for WSN protocols seems essential. In a number of WSN applications, sensor nodes sense data periodically... more

Low power and limited processing are characteristics of nodes in Wireless sensor networks. Therefore, optimal consumption of energy for WSN protocols seems essential. In a number of WSN applications, sensor nodes sense data periodically from environment and transfer it to the sink. Because of limitation in energy and selection of best route, for the purpose of increasing network remaining energy a node with most energy level will be used for transmission of data. The most part of energy in nodes is wasted on radio transmission; thus decreasing number of transferred packets in the network will result in increase in node and network lifetimes. In algorithms introduced for data transmission in such networks up to now, a single route is used for data transmissions that results in decrease in energy of nodes located on this route which in turn results in increasing of remaining energy. In this paper a new method is proposed for selection of data transmission route that is able to solve this problem. This method is based on learning automata that selects the route with regard to energy parameters and the distance to sink. In this method energy of network nodes finishes rather simultaneously preventing break down of network into two separate parts. This will result in increased lifetime. Simulation results show that this method has been very effective in increasing of remaining energy and it increases network lifetime.

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be... more

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public verifiability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Retrievability model [1] by manipulating the classic Merkle Hash Tree (MHT) construction for block tag authentication. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.

Wireless sensor networks often consist of a large number of low-cost sensor nodes that have strictly limited coverage and communication capabilities. As wireless sensor networks are typically deployed in remote and hostile backgrounds to... more

Wireless sensor networks often consist of a large number of low-cost sensor nodes that have strictly limited coverage and communication capabilities. As wireless sensor networks are typically deployed in remote and hostile backgrounds to transmit sensitive information, sensor nodes are likely to node replication attack. In node replication attack an adversary captures only a few of nodes, replicates them and then deploys an arbitrary number of replicas throughout the network. If this attack is not detected, then these replicas will consume network resources and can make the network vulnerable to a large class of internal attacks. Detecting the node replication attack has turn into a crucial research topic in sensor network security. In this survey, we have deliberated the existing detection schemes for detection of clone attacks that comes under the centralized and distributed techniques.

Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this paper. The scheme,... more

Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this paper. The scheme, called MIHOP (MIMO and Multi-hop), combines cluster-based virtual MIMO and multi-hop technologies. The multihop mode is employed in transmitting data when the related sensors are located within a specific number of hops from the sink, and the virtual MIMO mode is used in transmitting data from the remaining sensor nodes. We compare the energy consumption of different transmission schemes and propose an algorithm for determining the optimal hop count in MIHOP. A controllable mobile sink that reduces the energy consumed in sensor transmission is also adopted for data collection. The theoretical analysis and the Monte Carlo simulation demonstrate that the proposed scheme significantly outperforms individual virtual MIMO, multi-hop technologies, and double-string networks in terms of energy conservation. The energy consumption levels under the MIHOP scheme are approximately 12.98%, 47.55% and 48.30% less than that under virtual MIMO schemes, multi-hop networks and doublestring networks, respectively.