Abstract-Wireless Sensor Networks (WSNs) are a promising innovation for a few modern and everyday applications. The advancement of remote sensor systems was spurred for use in reconnaissance in a war zone by military applications. These days WSN systems are utilized as a part of modern industrial applications for monitor and control the process flow, to monitor machine health, in consumer applications and so on. A couple to a few a huge number of junctions are comprised in WSN, where every junction is associated with one or now and again more sensors. There is a need for an approach that prevents unauthorized nodes from using the network to communicate the legitimate nodes or Internet. This will probably reduce most of the security attacks that can be happened. Some systems use Elliptic Curve Cryptography(ECC) for authentication process, because small size of key used for encryption. However, ECC have some disadvantages. The primary problem in ECC is, it significantly makes encrypted message greater in size which makes this mechanism more complex. Furthermore, it is difficult to implement when compared to other public key encryption techniques and also it provides less security alone. To overcome difficulties in ECC, this system introduces Migrated ECC that uses asymmetric key. This system consist of node registration, distribution of authorized node list to all legitimate nodes, and mutual authentication of nodes in different networks, and handover of node from one network to other. From our assumption, it proves that Migrated ECC performs better than ECC in terms of security and efficiency. Keywords: Wireless Sensor Networks, Mutual Authentication, Security Attack, Migrated ECC.I. INTRODUCTION A WSN is an extraordinary sort of remote correspondence arranges comprising of various quantities of geologically appropriated self-ruling gadgets utilizing sensors to screen physical or natural conditions. This framework contains a passage junction which goes about as a halfway junction that gives remote network back to the wired world and circulated nodes for the purpose of sending WSN data to different types of networks.WSN is utilized as a part of Military and national security applications, Environment checking, and Medical applications. Wireless Sensor Networks used in many applications due to its low cost, tiny size and ease of deployment [1]. In any case, there are a few security difficulties to be overcome to completely understand the favorable circumstances because of ubiquitous nature of WSN. Correspondence being communicated in nature is more inclined to various sort of assaults like eves dropping, capture, infuse and change transmitted information [2]. WSN systems are described by little size, a substantial number, and minimal effort. It is obliged by vitality, computational power, and correspondence data transmission and capacity. Little size suggests little battery, ease and low power CPU, radio with least data transfer capacity and range [3].Conventional cryptographic calculations utilizing open key are e...
Wireless communications has completely revolutionized the living environment, just as personal computers forever altered the way of working in the 1980's and the Internet dramatically changed the obtainment and accessing way of information in the 1990's. Wireless sensor networks are evolving to a new level. The Failure liability is a very prominent problem in Wireless Sensor Network (WSN) research. Failure liable nodes behave in different form and this faulty behavior is referred to as multifarious faults or heterogeneous faults in WSN. This paper presents a Multifarious Failure liability Investigation protocol called Wireless Nodal Behavior and Liability Investigation (WNBLI) protocol for wireless sensor networks. The proposed WNBLI protocol consists of three vital phases, such as Association phase, Apprehension phase and Assortment phase. The performance of the proposed Wireless Nodal Behavior and Liability Investigation protocol is evaluated using network simulator.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.