Security Management in Wireless Sensor Network (WSN)
Security Management in Wireless Sensor Network (WSN)
ISSN No:-2456-2165
Security Management in
Wireless Sensor Network (WSN)
Sumant Verma, Mr. Pradeep Baniya
Computer Science & Engineering Indore Institute
of Science & Technology Indore,
India
Abstract:- Wireless Sensor Network (WSN) plays a vital A. Architecture of Wireless Sensor Network (WSN):
role in emerging sensing technology. They are used in Wireless Sensor Network (WSN) consists of following
various fields such as military operations, healthcare components:
applications, traffic control, and home applications. Even Sensor Node: - It is low powered, small in size and has low
sensor can monitor, pressure, humidity, noise level, storage. It includes radio transceiver, an antenna, a
temperature, soil makeup and other properties. Wireless microcontroller and for energy a battery.
Sensor Network can be of consist of different types of Gateway: - It enables communication between host
sensors like thermal, visual, infrared, acoustic and radar. application and field devices.
Wireless Sensor Network (WSN) is broadcast nature of the Network Manager: - It is responsible for configuration of
wireless communication so it becomes easy for the attacker the network scheduling.
to send false data or false information to compromise the
entire network due to which there are high chances that
causes problem in making decision.
IV. CONCLUSION
Fig. 3: Implementation Diagram This paper presents details study on the security of
Wireless Sensor Network (WSN). Firstly, introducing about
Proposed Program Wireless Sensor Network (WSN) in detail and then discussed
import hashlib about the security issue. Security is an important requirement
import base64 because the application of Wireless Sensor Network (WSN)
will be deeper and wider like in healthcare and military
#Sender and Receiver share a secret key
purposes. Wireless Sensor Network (WSN) product in
secret_key = "secret key".encode()
industry will not get acceptance unless there is a full proof
#Sender generates MAC security to the network. There are limitations in sensors like
message = "Information from sender!!!".encode() low power energy and low space storage. To overcome the
sha256 = hashlib.sha256() problem of security usually keeping in mind about the low
sha256.update(secret_key) storage, we provided Message Authentication Code (MAC)
sha256.update(message) use, because of this it is guaranteed that the message is to from
h1mac = sha256.digest() authenticated to the source. It takes less computing load, high
security, less computing load, efficient utilization of resources
such as memory, bandwidth, and power.