International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 09 | Dec-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 955 BANDWIDTH EFFICIENT COOPERATIVE AND ENERGY BASED AUTHENTICATION FOR WIRELESS SENSOR NETWORK A.P.THANGAMUTHU 1 , B.CHITHRA 2 1 Asst Prof, Department of Computer Applications, SNMV College of Arts and Science, Tamil Nadu, India 2 Asst Pof, Department of ComputerTechnology, SNMV College of Arts and Science, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Wireless detector networks (WSNs), as associate degree rising technology face varied challenges. Detector nodes are typically resource constrained and conjointly at risk of physical attacks or node compromises. Because the projected applications for wireless detector networks vary from sensible applications like traffic monitoring to important military applications like menstruation levels of gas concentration in battle fields, security in detector networks becomes a first-rate concern. In sensitive applications, it becomes imperative to unceasingly monitor the transient state of the system instead of steady state observations and take requisite preventive and corrective actions. This paper propose a bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in Wireless sensor Networks. Sensor node could be easily compromised as the attacker can gain control obtain key values and change the properties of the node. This results in a false report to sink and energy waste in end-route nodes. The proposed BECAN scheme can save energy by early detecting and filtering the most of injected false data with less time and difficulty at the en-route nodes. In addition, only a very small amount of injected false data needs to be checked by the sink, thereby reducing the burden on sink. To filter the false data, the BECAN scheme adopts cooperative neighbor router (CNR)- based filtering mechanism. Hence it achieves not only high filtering probability but also high reliability. 1. INTRODUCTION Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and Sybil attacks. In addition, wireless sensor networks may also suffer from injecting false data attack. For an injecting false data attack, an adversary first compromises several sensor nodes, accesses all keying materials stored in the compromised nodes, and then controls these compromised nodes to inject bogus information and send the false data to the sink to cause upper level error decision, as well as energy wasted in en-route nodes. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. Wireless sensor networks (WSN) offer an increasingly Sensor nodes need less power for processing as compared to transmitting data. It is preferable to do in network processing inside network and reduce packet size. One such approach is data aggregation. Fig. 1 Wireless Sensor Network Architecture. Wireless sensor networks are consisting of numerous light weight and tiny sensor nodes with limited power, storage, communication and computation capabilities. Fig 2. Data transmitted user to target Due to the fast booming of micro electro mechanical systems, wireless sensor et working has been subject to extensive research efforts in recent years. It is well known as a general and ubiquitous approach for some applications like environmental and habitat monitoring, surveillance and tracking for military [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16]. A wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. The cost of each sensor node is low but it contains required