ISSN ONLINE(2319-8753)PRINT(2347-6710)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Research Article Open Access

ROBUST VIRTUAL ENERGY KEY MANAGEMENT BASED LOCATION VERIFICATION SYSTEM FOR WSN

Abstract

Localization in wireless sensor networks, i.e., knowing the location of sensor nodes, is very important for many applications such as environment monitoring, target tracking, and geographical routing. Since wireless sensor networks may be deployed in hostile environment, sensors’ localization is subjected to many malicious attacks. Therefore, sensors’ locations are not trstworthy and need to be verified before they can be used by location-based applications. Previous verification schemes either require group-based deployment knowledge of the sensor field, or depend on expensive or dedicated hardware, thus they cannot be used for low-cost sensor networks. In this project, we propose a lightweight location verification system. In addition, we propose vector based virtual energy key management based privacy information transfer for WSNs that significantly reduces the number of transmissions needed for rekeying to avoid stale keys. It is a secure communication frame-work where sensed data is encoded using a scheme based on a permutation code generated via the RC4 encryption mechanism. The key to the RC4 encryption mechanism dynamically changes as a function of the residual virtual energy of the sensor.Thus, a one-time dynamic key is employed for one packet only and different keys are used for the successive packets of the stream. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s virtual energy, thus requiring no need for specific rekeying messages. It is able to efficiently detect and filter false data injected into the network by malicious outsiders. Our results show that, without incurring transmission overhead, is able to eliminate malicious attack from the network in an energy efficient manner.

K.Rajesh, S.Manikandan

To read the full article Download Full Article