0% found this document useful (0 votes)
53 views4 pages

Security Management in Wireless Sensor Network (WSN)

1) The document discusses security management in wireless sensor networks (WSNs). It describes the basic architecture of WSNs, which includes sensor nodes, gateways, and a network manager. 2) WSNs are vulnerable to attacks because the wireless communication can be compromised. Message authentication is important to verify that messages are from the claimed sender. 3) The document proposes using message authentication codes (MACs) for authentication in WSNs. MACs allow receivers to verify that messages are from the claimed sender and prevent false data or misinformation from being accepted.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views4 pages

Security Management in Wireless Sensor Network (WSN)

1) The document discusses security management in wireless sensor networks (WSNs). It describes the basic architecture of WSNs, which includes sensor nodes, gateways, and a network manager. 2) WSNs are vulnerable to attacks because the wireless communication can be compromised. Message authentication is important to verify that messages are from the claimed sender. 3) The document proposes using message authentication codes (MACs) for authentication in WSNs. MACs allow receivers to verify that messages are from the claimed sender and prevent false data or misinformation from being accepted.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Volume 7, Issue 11, November – 2022 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Security Management in
Wireless Sensor Network (WSN)
Sumant Verma, Mr. Pradeep Baniya
Computer Science & Engineering Indore Institute
of Science & Technology Indore,
India

Abstract:- Wireless Sensor Network (WSN) plays a vital A. Architecture of Wireless Sensor Network (WSN):
role in emerging sensing technology. They are used in Wireless Sensor Network (WSN) consists of following
various fields such as military operations, healthcare components:
applications, traffic control, and home applications. Even  Sensor Node: - It is low powered, small in size and has low
sensor can monitor, pressure, humidity, noise level, storage. It includes radio transceiver, an antenna, a
temperature, soil makeup and other properties. Wireless microcontroller and for energy a battery.
Sensor Network can be of consist of different types of  Gateway: - It enables communication between host
sensors like thermal, visual, infrared, acoustic and radar. application and field devices.
Wireless Sensor Network (WSN) is broadcast nature of the  Network Manager: - It is responsible for configuration of
wireless communication so it becomes easy for the attacker the network scheduling.
to send false data or false information to compromise the
entire network due to which there are high chances that
causes problem in making decision.

Here the solution proposed is MAC (Message


Authentication Code), Authentication is necessary for
many administrative tasks informally; data authentication
allows a receiver to verify that the data really is sent by the
claimed sender. If the message is from claimed sender then
the message or information is accepted or if the message is
from not from the claimed sender then the message or
information is not accepted.

Keywords:- Wireless Sensor Network (WSN), MAC (Message


Authentication Code), Attacker, Security. Fig. 1: Architecture of WSN

I. INTRODUCTION B. Advantages of Wireless Sensor Network (WSN):


 New nodes or devices can be added at any time.
The Wireless Sensor Network (WSN) consists of  All nodes can be accessed through centralized monitoring
sensors that are tiny in size and have the capability of sensing system.
things and communicating with other devices, over a specific  Since it is wireless in nature so it is cost efficient as it
area. They are low cost solutions for variety of real world does not require wires and cables.
applications. Wireless Sensor Network (WSN) sensors are  They can be used in variety of domains such as military,
small in size and low power. Also the main problem of the healthcare, agriculture, mines etc.
sensor is that it has very low storage, so whatever algorithm or
program is written for securing the network, it has to very C. Disadvantages of Wireless Sensor Network (WSN):
small and efficient in order to work properly. Wireless Sensor  Sensors have low storage and low powered battery.
Network (WSN) is broadcast in nature means the network can  It cannot be used for high speed communication due to
be compromised by the attacker. The attacks can target any low bandwidth.
node, this can lead to leak secret information and interfering  It is wireless in nature, so it can be hacked easily by the
message which ultimately violates security. Therefore attacker.
authenticity is a mandatory service for securing Wireless  It is expensive to build such network.
Sensor Network (WSN), because message modification or
message falsification is problems that need to be solved. D. Applications of Wireless Sensor Network (WSN):
 It can be used in environmental applications like to track
movement of birds, small animals, and insects.
 It can be used in military applications.
 It can be used in health applications like to monitor a
patient or monitor internal process of small animals.
 It can be used in agriculture applications like to monitor
temperature, measuring water supply and so on.

IJISRT22NOV589 www.ijisrt.com 1293


Volume 7, Issue 11, November – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Authors/Researchers Description
Prachi Pathak and Proposed directional antenna,
Amzad Quaz cryptography and key
management protocol.
Classification of attacks in
WSN.
Moises Salinas Rosales, Proposed security solution
Gina Gallegos Garcia, through cryptography and
Gonzalo Duchen MAC.
Sanchez
Prashant Shukla Proposed security issues and
challenges in WSN and
provided the defense and
counteraction research
solution to the security.
Swati Bartariya and Identify the security threats
Ashutosh Rastogi and attacks in WSN with
security solutions.
A.K. Nuristani and About security, challenges,
Jawahar Thakur solutions like MAC, key
management, encryption.
Amit Kumar Gautam, Description on various trust
Rakesh Kumar management, authentication
and key management schemes.
Kamlesh Kumar and Description on types of
Shibin David threats, challenges and
solutions.
Fig. 2: Diagram of WSN Applications Jian Wang Solving security problem by
key management scheme.
II. RELATED STUDY Vishal Rathod and Solving security in WSN by
Mrudang Mehta trust management approach.
There are several proposals for implementing Shengjun Xie, Xiang Clarifies structure of DC
authenticity services on Wireless Sensor Network (WSN), the Wang and Hua Shang WSN for EIoT and prediction
most are based on symmetric techniques and only a few ones of possible attacks.
involve public key cryptography indirectly. Symmetric Fei Hu, jim Ziobro, Overview on secure routing,
cryptography offers low complexity in algorithms and small Jason Tillett and Neeraj prevent of DOS and key
data pieces to manipulate and store. However scalability and K. Sharma management service.
flexibility are the drawbacks in these techniques. This Preetkamal Singh, Dr. Description about
approach has been explored in several proposals for implement OP Gupta and Sita Saini applications, challenges and
security services using symmetric encryption, keyed and un- security in WSN
keyed hash functions and pre-distribution key techniques as
Nidhi Chandra and Security of WSN, its
proposed in the work of Du and Li among others.
Saima Maqbool challenges and category of
Oliveira et al. proposed in a key distribution method that attacks.
allows to two nodes to agree a common key. Oliveira’s Oladayo Olufemi Classification of WSN
approach explodes the use of IBC to accomplish the key Olakanmi and protocols and security and
exchange. Adedamola Dada privacy issues.
Selcuk Uluagac, Description about
 Survey: Many researchers have proposed the mechanism Christopher P. Lee and confidentiality, authentication,
attacks. The research in field of security in Wireless Sensor John A. Copeland integrity, access control,
Network (WSN) issues, challenges and solution which have availability.
been taken help are as follows: Table 1: Researchers/Authors with their methods and details

IJISRT22NOV589 www.ijisrt.com 1294


Volume 7, Issue 11, November – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
III. PROPOSED SOLUTION #Receiver receives and validates MAC
sha256 = hashlib.sha256()
To know that the message or information is coming from sha256.update(secret_key)
actual sender we are using Message Authentication Code sha256.update(message)
(MAC) in the Wireless Sensor Network (WSN). Here Message h2mac = sha256.digest()
Authentication Code (MAC) contains cryptographic process.
With the help of symmetric key the cryptographic process is if (h1mac==h2mac):
implemented for sender and receiver. We have implemented in print("---Message and MAC from Sender---")
python language since it will take less memory as sensors print(message,'***', h1mac)
consist of less and limited memory. print("---Message and MAC from Receiver---")
print(message,'***', h2mac)
In the block diagram Fig 3, sender wants to send message else:
and sender apply Symmetric Key (K) and generates MAC print("Network Compromised")
value say H1 then the message and MAC value H1 along with
the message is received by the receiver. Now receiver will also
S.No. MODULE DESCRIPTION
calculates its MAC value say H2 with the same Symmetric
It is an interface for hashing
Key (K) used by the sender. Then there will be comparison is
messages easily. This contains
done between MAC values H1 and H2. If MAC value H1 and
1. numerous methods which will
MAC value H2 are same that means there is no change in the
hashlib handle hashing any raw message
message by the attacker or hacker and we can accept that
in an encrypted format. The core
message. But if MAC value H1 and MAC value H2 are not
purpose of this module is to use a
same that means the message has been changed by the attacker
hash function on a string, and
or hacker and we cannot accept that message as the message is
encrypt it so that it is very
corrupted that can lead to misleading in taking important
difficult to decrypt it.
decisions.
In Python the base64 module
2. is used to encode and decode
base64 data. First, the strings are
converted into byte-like objects
and then encoded using the
base64 module.
Table 2: Implemented Modules

S.No. MODULE DESCRIPTION


1. encode The encode() method encodes
the string, using the specified
encoding.
2. update Update the hmac object
with msg.
3. digest This method is used to return the
digested data which is passed
through the update method.
Table 3: Implemented Methods

IV. CONCLUSION
Fig. 3: Implementation Diagram This paper presents details study on the security of
Wireless Sensor Network (WSN). Firstly, introducing about
 Proposed Program Wireless Sensor Network (WSN) in detail and then discussed
import hashlib about the security issue. Security is an important requirement
import base64 because the application of Wireless Sensor Network (WSN)
will be deeper and wider like in healthcare and military
#Sender and Receiver share a secret key
purposes. Wireless Sensor Network (WSN) product in
secret_key = "secret key".encode()
industry will not get acceptance unless there is a full proof
#Sender generates MAC security to the network. There are limitations in sensors like
message = "Information from sender!!!".encode() low power energy and low space storage. To overcome the
sha256 = hashlib.sha256() problem of security usually keeping in mind about the low
sha256.update(secret_key) storage, we provided Message Authentication Code (MAC)
sha256.update(message) use, because of this it is guaranteed that the message is to from
h1mac = sha256.digest() authenticated to the source. It takes less computing load, high
security, less computing load, efficient utilization of resources
such as memory, bandwidth, and power.

IJISRT22NOV589 www.ijisrt.com 1295


Volume 7, Issue 11, November – 2022 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
REFERENCES [22.] M.B. Apsara, P.Dayananda and C.N.Sowyarani, A
Review on Secure Group Key Management Schemes for
[1.] Jeevan Kumar and Sushanta Mahanty, Security in Data Gathering in WSN, Vol. 10, No. 1, 2020
wireless network, IJERT, 2013 [23.] Jian Wang, Secured Communications in Wireless Sensor
[2.] Nidhi Chandra and Saima Maqbool, Categorized security Networks
threats in WSN, International Journal of Computer [24.] Swati Bartariya and Ashutosh Rastogi, Securtiy in
Applications, February 2013 Wireless Sensor Networks: Attacks and Solutions,
[3.] Prachi Pathak and Amzad Quaz, Issues, Challenges and IJARCCE.
Solution in WSN, International Journal of Electrical,
2017
[4.] Ankur Sirohi and Dr. Amit K. Agarwal, Security in
(WSN), 2020
[5.] Zhang Huanan, Xing Suping and Wang Jiannan, Security
and application of (WSN), ICICT-2020
[6.] Riaz Shaik and Shaik Shakeed Ahamad, Security Attacks
and Challenges of (WSN), International Journal of
Engineering & Technology, 2018
[7.] Saqib Ali, Taiseera Al-Balushi, Omar Khadeer Hussain,
Improving The Resilience of WSNs Against Security
Threats, IJT, 2018
[8.] Selcuk Uluagac, Christopher P. Lee and John A.
Copeland,Designing Secure Protocols for WSNs
[9.] Fei Hu, jim Ziobro, Jason Tillett and Neeraj K. Sharma,
Secure (WSN):Problems and Solutions, IEEE
[10.] Hyung-Woo Lee and Choong Seon Hong, Security in
(WSN):Issues and Challenges

[11.] Preetkamal Singh, Dr. OP Gupta and Sita Saini, A Brief


Study of WSN, Advances in Computational Sciences and
Technology, 2017
[12.] Shengjun Xie, Xiang Wang and Hua Shang, Security
Analysis on WSN in the Data Center for Energy Internet
of Things, 2020
[13.] Vishal Rathod and Mrudang Mehta, Security in WSN,
Ganpat University Journal of Engineering & Technology,
2011
[14.] A.K. Nuristani and Jawahar Thakur, Security Issues and
Comparative Analysis of Security Protocols in WSN,
JCSE, 2018
[15.] MOISES SALINAS ROSALES, GINA GALLEGOS
GARCIA, GONZALO DUCHEN SANCHEZ, Efficient
Message Authentication Protocol for WSN, Issue 6,
Volume 8, June 2009
[16.] M. B. Apsara, P. Dayananda, C. N. Sowmyarani, A
Review on Secure Group Key Management Schemes for
Data Gathering in Wireless Sensor Networks, Vol. 10,
No. 1, 2020
[17.] Amit Kumar Gautam, Rakesh Kumar, A comprehensive
study on key management, authentication and trust
management techniques in wireless sensor networks, 09
January 2021
[18.] Oladayo Olufemi Olakanmi and Adedamola Dada,
Wireless Sensor Networks (WSNs): Security and Privacy
Issues and Solutions, Submitted: August 28th, 2018
Reviewed: February 6th, 2019Published: March 29th,
2020.
[19.] Prashant Shukla, Security Issues, Challenges and
Solutions for Wireless Sensor networks
[20.] Mauricio Tellez Nava, Improving the security of WSN,
2016
[21.] Jaydip Sen, Security in Wireless Sensor Networks

IJISRT22NOV589 www.ijisrt.com 1296

You might also like