|
An End-to-End Security Aware WSN Approach with Localization, Authentication, and Data Exchange Security |
|---|---|
| รหัสดีโอไอ | |
| Creator | Priyanka R, K Satyanarayan Reddy |
| Title | An End-to-End Security Aware WSN Approach with Localization, Authentication, and Data Exchange Security |
| Contributor | - |
| Publisher | TuEngr Group |
| Publication Year | 2565 |
| Journal Title | International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies |
| Journal Vol. | 13 |
| Journal No. | 7 |
| Page no. | 13A7N: 1-14 |
| Keyword | WSN, Security, Localization, ECDH, RSA, Cryptography |
| URL Website | http://TuEngr.com/Vol13-7.html |
| Website title | ITJEMAST V13(7) 2022 @ TuEngr.com |
| ISSN | 2228-9860 |
| Abstract | The demand for sensor Network-based communication has increased due to its wide range of applications. Reliability of data collection is a challenging task in these networks. There are two concerns about sensor placement. First, attackers may target the localization process to manipulate estimated positions. Second, because sensor nodes may get hacked, Base Station (BS) might not be able to trust the positions provided by sensor nodes. Researchers have proposed two techniques to address these two issues: secure localization and location verification. Routing in WSN is considered because it facilitates the transmission of data from any source node to the destinated nodes. Routing attacks have the potential to disrupt and degrade WSN functionality. Numerous experiments, including cryptographic approaches and centralized routing, have been done to enhance confidence between routing nodes. However, the generally utilized message transmission approaches are unsuitable in reality because of the difficulties they face in accurately recognizing hostile node activity. This study focuses on introducing a combined method where secure node localization, node authentication, and secure data exchange via cryptography are presented. The comparative analysis shows that the proposed approach can prevent a greater number of internal and external attacks when compared with state-of-art techniques. |