(Department of Information Science and Engineering, Cambridge Institute of Technology, Bangalore, Affiliated to VTU, Belagavi, INDIA),
K Satyanarayan Reddy
(Cambridge Institute of Technology North Campus Bangalore, Affiliated to VTU, Belagavi, INDIA).
Disciplinary: Computer Science & Engineering.
Keywords: WSN; Security; Localization; ECDH; RSA; Cryptography.
The demand for sensor Network-based communication has increased due to its wide range of applications. Reliability of data collection is a challenging task in these networks. There are two concerns about sensor placement. First, attackers may target the localization process to manipulate estimated positions. Second, because sensor nodes may get hacked, Base Station (BS) might not be able to trust the positions provided by sensor nodes. Researchers have proposed two techniques to address these two issues: secure localization and location verification. Routing in WSN is considered because it facilitates the transmission of data from any source node to the destinated nodes. Routing attacks have the potential to disrupt and degrade WSN functionality. Numerous experiments, including cryptographic approaches and centralized routing, have been done to enhance confidence between routing nodes. However, the generally utilized message transmission approaches are unsuitable in reality because of the difficulties they face in accurately recognizing hostile node activity. This study focuses on introducing a combined method where secure node localization, node authentication, and secure data exchange via cryptography are presented. The comparative analysis shows that the proposed approach can prevent a greater number of internal and external attacks when compared with state-of-art techniques.
Paper ID: 13A7N
Cite this article:
Priyanka, R., Reddy, K. S. (2022). An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 13(7), 13A7N, 1-15. http://TUENGR.COM/V13/13A7N.pdf DOI: 10.14456/ITJEMAST.2022.140