Extended SPINS Framework for Security Wireless Sensor Network Khalid M. Abdullah 1 , Essam H. Houssein 2, and Hala H. Zayed 1 1 Computer Science Department, Faculty of Computers and Informatics, Benha University, Egypt 2 Computer Science Department, Faculty of Computers and Information, Minia University, Egypt Abstract Security in Wireless Sensor Networks (WSNs) plays an important role in the node communication. The significant growth is existed for developing the wireless sensor network applications. The key features of Wireless sensor networks are low power, low memory, and low-energy. Due to this various facts, the existing security algorithms are not appropriate for current applications. Many papers have been developed in this work. We describe the SPINS protocol of security for WNSs. In this work, the Sensor Protocols for Information via Negotiation (SPINS) is explained. It is a framework that implements the overall security in WSN with the use of Sensor Network Encryption Protocol (SNEP) and the “micro” version of the Timed, Efficient, Streaming, Loss-tolerant Authentication Protocol (μTESLA) protocol. The previous research papers reveal that RC5 encryption algorithm done employed by SNEP for WSN. The proposed technique can defend against most well- recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on AES and RSA. Keywords: security, TEA, AES, Wireless sensor network, SNEP, SPINS. 1. Introduction The rapid emergence of Wireless Sensor Networks (WSN) has come due to different reasons. Of the most important reasons is battlefield communications all to the communications in unreachable areas. However, with that came one drastic problem that faces WSNs which is their lack of security. In such way, WSNs are prone to be attacked; thus, the need of security solutions is necessary [1]. It is worth noting, however, that a large number of WSN architectures have been proposed and a key distribution solution that is well suited to one architecture is likely not to be the best for another, as different network architectures exhibit different communication patterns. Recent works show that there is a rapid advancement in a technology known as Micro-Electro-Mechanical Systems (MEMS). Other developments have been made in the fields of digital electronics and wireless communications as seen in the recent years. Those advancements have allowed the decrease of costs and power while they increased the multi-functionality of sensor nodes. Sensor nodes come in small sizes and communicate through short distances. They consist of sensing, data processing, and communication mechanisms. Sensor networks represent major improvements over traditional sensors, which are deployed in the following two ways [2]: They can be placed far from the phenomenon and the larger they are, the more complex the technique they use is to differentiate between the targets of the environment. A number of sensors can perform only sensing and they can be deployed. However, the positions of those sensors and communications topology should be thoughtfully engineered. They transmit time series of the sensed phenomenon to the central nodes where computations are performed where the data are fused. There are a lot of sensor nodes in a sensor network which is deployed within or closely around the phenomenon. The placement of a sensor network doesn’t require planning ahead, which allows it to be randomly placed within the inaccessible areas. This makes the sensor networks and algorithms self-organize their abilities. One of the unique features in sensor networks is that they can use cooperative efforts with an on-board processor which means that instead of sending data while it’s in its raw state, they use the processing ability to locally carry out simple computer equations and transmit the necessary data only [3-6]. However, another challenge presents itself to WSNs which is routing. This is due to several aspects that identify them from other modern communication and wireless ad hoc networks. It is almost impossible to design a universal addressing scheme for sensor node deployment, for that reason, classical IP-based protocols cannot be applied to sensor networks. Most of the applications of sensor IJCSI International Journal of Computer Science Issues, Volume 14, Issue 2, March 2017 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 www.IJCSI.org https://doi.org/10.20943/01201702.5866 58 2017 International Journal of Computer Science Issues