International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 09 | Dec-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 955
BANDWIDTH EFFICIENT COOPERATIVE AND ENERGY BASED
AUTHENTICATION FOR WIRELESS SENSOR NETWORK
A.P.THANGAMUTHU
1
, B.CHITHRA
2
1
Asst Prof, Department of Computer Applications, SNMV College of Arts and Science, Tamil Nadu, India
2
Asst Pof, Department of ComputerTechnology, SNMV College of Arts and Science, Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Wireless detector networks (WSNs),
as associate degree rising technology face varied
challenges. Detector nodes are typically resource
constrained and conjointly at risk of physical attacks or
node compromises. Because the projected applications
for wireless detector networks vary from sensible
applications like traffic monitoring to important
military applications like menstruation levels of gas
concentration in battle fields, security in detector
networks becomes a first-rate concern. In sensitive
applications, it becomes imperative to unceasingly
monitor the transient state of the system instead of
steady state observations and take requisite preventive
and corrective actions.
This paper propose a bandwidth-efficient
cooperative authentication (BECAN) scheme for
filtering injected false data in Wireless sensor
Networks. Sensor node could be easily compromised as
the attacker can gain control obtain key values and
change the properties of the node. This results in a false
report to sink and energy waste in end-route nodes. The
proposed BECAN scheme can save energy by early
detecting and filtering the most of injected false data
with less time and difficulty at the en-route nodes. In
addition, only a very small amount of injected false data
needs to be checked by the sink, thereby reducing the
burden on sink. To filter the false data, the BECAN
scheme adopts cooperative neighbor router (CNR)-
based filtering mechanism. Hence it achieves not only
high filtering probability but also high reliability.
1. INTRODUCTION
Wireless sensor networks are usually deployed at
unattended or hostile environments. Therefore, they are
very vulnerable to various security attacks, such as
selective forwarding, wormholes, and Sybil attacks. In
addition, wireless sensor networks may also suffer from
injecting false data attack. For an injecting false data
attack, an adversary first compromises several sensor
nodes, accesses all keying materials stored in the
compromised nodes, and then controls these
compromised nodes to inject bogus information and send
the false data to the sink to cause upper level error
decision, as well as energy wasted in en-route nodes.
The main goal of data aggregation algorithms is to
gather and aggregate data in an energy efficient manner so
that network lifetime is enhanced. Wireless sensor
networks (WSN) offer an increasingly Sensor nodes need
less power for processing as compared to transmitting
data. It is preferable to do in network processing inside
network and reduce packet size. One such approach is
data aggregation.
Fig. 1 Wireless Sensor Network Architecture.
Wireless sensor networks are consisting of numerous light
weight and tiny sensor nodes with limited power, storage,
communication and computation capabilities.
Fig 2. Data transmitted user to target
Due to the fast booming of micro electro mechanical
systems, wireless sensor et working has been subject to
extensive research efforts in recent years. It is well known
as a general and ubiquitous approach for some
applications like environmental and habitat monitoring,
surveillance and tracking for military [1], [2], [3], [4], [5],
[6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16]. A
wireless sensor network is usually composed of a large
number of sensor nodes which are interconnected through
wireless links to perform distributed sensing tasks. The
cost of each sensor node is low but it contains required