SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Reliability in WSN for Security: Mathematical
Approach.
George S. Oreku
1,2
1
Tanzania Industrial Reseach and
Development Organization (TIRDO)
P.O Box23235 DSM Tanzania
2
School of Information Technology
North West University - Vaal Triangle
Campus, 1900 South Africa,
P.O.Box1174 vanderbijlpark
+27 762378953
George.oreku@gmail.com
ABSTRACT
Modern wireless sensor networks require specific and high degree
of security due to their limitation and versatility tasks. The
absence of permanent infrastructure makes these networks
suitable for many civilian applications. But their limited
computational ability and battery resources restrictions makes
them vulnerable to many kinds of attacks. This paper presents
reliability in Wireless Sensor Network (WSN) information
transmition, which can be used to exactly estimate the system
working quality. The WSN reliability mathematical calculation
approach presented in this paper gives insight on how to secure
WSN through reliable backbone connectivity, reliable sensor
network and data aggregation. Solutions to meet WSN security
interconnectivity reliability, network reliability and data
aggregation scheme for robust security systems designing also
have been introduced.
Keywords
Networks, WSN Security, WSN, Design, Security, Data
Delivery, Reliability.
1. INTRODUCTION
Sensor networks are being deployed in situations where it
is important to protect the message communication from
eavesdropping or tampering. Wireless Sensor network
(WSN) consists of sensor nodes which are deployed in
versatile and often potentially hostile environment,
responsible for sensing, processing, and transferring
environmental information on the sensor field towards the
sink node that is often referred to as BS (Base Station) as
can be seen on figure one below. The absence of fixed
infrastructure and cost effectiveness makes WSN ideal for
civilian applications such as disaster relief, emergency
rescue operations, patient monitoring, environmental
control, military applications such as target identification
and tracking as well as surveillance networks.
These applications require that sensor networks offer a high
degree of security. An adversary can thwart the work of
any part of the network by perturbing the information
produced,
stopping production, or pilfering information to all what
has been mentioned above as function or application of
WSN.
To reduce the vulnerability paper [1] argues that, the WSN
design must balance traditional objectives such as energy
efficiency, cost, and application level performance with
security to the higher degree than attacker’s competence.
The authors in [2] developed architecture and associated
algorithms to build a self-organizing WSN system that is
capable of detecting mobile targets using cooperative
sensors that are randomly deployed in a physical
environment.
The primary focus presented in manuscript [3] is to
providing security mechanisms that enables the secure
operation of in-network processing, a key emerging theme
in the design and deployment of WSN. Jones et al. in [4]
described a WSN model and proposed a solution which
uses parameterized frequency hopping and cryptographic
keys to provide differential security services and readily
applicable to WSNs having anonymous nodes that are
unaware of location. Perrig et al also proposed SPINS [5], a
general security infrastructure for WSN.
The infrastructure consists of an encryption primitive;
SNEP, and an authenticated streaming broadcast primitive,
micro TESLA have been well discussed in [14]. In [6], an
algorithm to reliably transfer data by using one-phase pull
directed diffusion, a data-centric routing technique in
WSNs have been presented.
However the research in papers [7, 14] presents the ideas
on how to improve and enhance security and performance
of an Ad Hoc networks through a multipath routing
strategy and cipher block chaining.
Consequently, that makes us to believe that existing
security mechanisms are inadequate, and new ideas are
978-1-4673-5285-7/13/$31.00 ©2013 IEEE
needed. Fortunately, the new problems also inspire new
research and represent an opportunity to properly address
sensor network security from the start.
Motivated with existing research gaps in WSN security we
formulate our findings based on three main questions,
where by first is what are the requirements for designing
reliable security system? Second is how to estimate total
WSN reliability which includes backbone interconnection
and each WSN components and third is how to design
mathematical model of reliable security system and
calculate non-failure operation probability which we further
examine in details from sections 3-4 below.
We assume that the node failures are statistically
independent and imagine that the node meantime- to-failure
(MTTF) is relatively large compared to the message
transmission time, the maximum propagation delay, and,
the time required by the network to adapt to topology
changes due to failures. Therefore the possible estimate of
the operational probability is calculated as MTTF/
(MTTF+MTTR) as detailed in section four of the paper.
The rest of the paper is organized as follow; Section 2
presents the requirements for WSN security and advantages
of our approach. Proposed reliability approach and data
aggregation for security is presented in section 3. The paper
evaluates security verification of WSN mathematically and
system working reliability in sections 4 and gives
conclusion in section 5.
2. SECURITY REQUREMENTS FOR WSN
In many ways security has been viewed as a stand alone
component of a system’s architecture or afterthought,
where a separate module provides security. This separation
is, however, usually a flawed approach to network security.
To achieve a secure system, security must be integrated
into every component. In many cases not integrating
security to components during system development design,
component has turned to be a point of attack. As a result,
security must pervade every aspect of system design. The
proposed approach addresses several aspects, being very
flexible and able to be easily adapted to different kinds of
scenarios when compared with the available approaches in
[15, 17]
To design reliable WSN security system, we follow the
reliability approach taking advantage of security
requirements in a following sequence:
1. Complex parameters for reliability (operational
availability coefficient, availability, operating
efficiency);
2. Reliability requirements (reliability probability, average
time before denial of service, on denial and on fault);
3. Time requirements (various time resources and life
time);
4. Repairability requirements (time for repairing average
active state (serviceable condition), time allowable for
repair);
5 Different types of dependability measures which can be
obtained from the same model (e.g., reliability,
availability, MTTF) as well as the criticality of the
network devices (Birnbaum’s measure).
The reflection of reliability requirements noticed above
gives us the general idea of setting up the calculation of
WSN reliability through interconnected backbone, WSN
component (sensor nodes) which characterizes quality of
the total working system and data aggregation which can
support in providing accurate aggregation results securely
without exhausting the network.
3. COMPLEXITY OF WSN RELIBILITY
We consider WSN as a complex system consists of three
components: sensor nodes grouped to clusters, task
manager node (user, base station) and interconnect
backbone [8], as shown in Figure 1. below. Each Sensor
Node contains various sensors and actuators that are used
to collect let’s say environmental data, process and transmit
them. Collected data are transferred to the base station
through the network.
Direct communication between individual nodes may be
required sometimes. Base station performs tasks in data
storage, analysis, display and control interface backbone
interconnectivity. Due to less stringent limitations, it can
perform significantly more complex tasks than WSN nodes.
Figure 1. Wireless sensor network configuration architecture
Therefore to calculate complex WSN reliability it’s
important to compute the reliability of each WSN
component (interconnected backbone and nodes organized
to clusters [9, 10, 11]). We assume a sensor to be a device
that possesses three basic capabilities: sensing, computing,
and communicating. Sleeping sensor consumes essentially
no energy [15]. In our scenario sensor network is connected
to the outside world through a sink node while having a full
range of computational and communication capabilities and
a renewable power supply. From the presented scenario we
introduce how we calculate interconnectivity reliability for
transmission as follow in section 3.1 below.
3.1 Reliability of Interconnectivity Backbone
To evaluate the reliability and availability of Wireless
Sensor Networks our approach depends on bandwidth
frequency of communication channel, signal power and
noise relation. Therefore maximum transmitting channel
bandwidth ( max
C ) can be calculated as follow:
max
log (1 / )2C F P Ps n= + (1)
where F – backbone interconnectivity frequency; sP –
signal power, n
P – noise power, (1 / )P Ps n+ – number of
signal level which can be accepted by receiver.
E.g., 3/s nP P = this means that power signal is more than
noise power for three times; therefore single signal can
transmit 4 values, i.e. log (1 3) 22 + = bites of data.
We calculate minimum time cycle ( minT ) for signals
transmission with F as follows:
min 1 / (2 )T F= (2)
Then number of unmistakably bites ( C ) transmitted in
channel per sec can be computed as:
2 2
2 [1 log (1 ) log (1 )]C F p p p p= + + − − , (3)
where p is probability of data distortion due to obstacles.
This equation allows exactly estimation of interconnectivity
backbone reliability.
3.2 Wireless Sensor network Reliability
In this presentation, it is assumed that sensor data readings
are sent towards a sink. Sensors are assumed to periodically
send data. Thus, the amount of data readings generated per
time interval in the sensor field is known. Additionally it is
assumed that packet losses are independent of additional
factors such as message size and traffic density. Increases
in message size will increase the probability of bit errors
within a message, but, note that in many forms of
aggregation, packet size remains unchanged or does not
change significantly. Therefore we define reliability of a
WSN as the probability that a minimum aggregate rate of
information ( nfo
P ) that can be delivered to the sink node.
However we characterize quality of the total working
system by efficiency (W) which depends in some
parameters including reliability calculation from [12] and
estimate it as follows:
( )1 2
, ,..., ,n
W f P P P R= (4)
Where 1P , 2P ,..., nP - performance quality of WSN
components; R - total reliability.
If assuming that 0
W is effectiveness with absolute reliable
system functioning, then 0ef
W K W= . Where-
efК means degree of degradation due to unreliability of
WSN components. Effectiveness saving coefficient ( efК )
is taken as an initial factor when analyze system reliability:
0
.ef
W
К
W
= (5)
The effectiveness saving coefficient for WSN is defined by
character of exploitation circle. Exploitation circle of WSN
can be presented as sequence of several conditions i.e. by
( )x t function. If ( ) 1x t = – serviceable condition; 0 –
system denied or on repair. In this case, reliability
estimation corresponds to some function, i.e. ( )i
x t
function, where i means particular system’s element.
Because of active time state, serviceable condition and
repair time which are taken as random values, and ( )i
x t as
a realization of random function ( )x t .
So ( )i
x t can be considered as mathematical operational
model of WSN and named as realization of operational
process. Then estimation of ith
realization, i.e.
functional ( )( )i
x tφ , as a realization of random
quantity ( )( )x tφ . And quantitative index of reliability R
can be considered as operational mathematical of random
quantity ( )( )x tφ which can be calculated as:
( )( )R M x tφ= (6)
where ( )( )x tφ - operational mathematical of random
quantity and where Μ is the required minimum number of
sensor nodes.
The WSN reliability and network parameters, especially
network reliability and data acquisition rate. Can improve
security from the point of system analysis to quality of
services, maximum data transport quantity and quality over
network nodes and backbone connectivity can be calculated
to ensure the safety flow of the information through sensor
nodes.
In order to solve reliability problem task, i.e. finding total
WSN reliability, we prove and analyze mathematically our
approach as:
( )1 1
,..., ; ,...,m n
W f x x y y= (7)
( )1 1
,..., ; ,..., 0k m n
q x x y yψ= = , (8)
Where W- criterion of efficiency; 1
x , 2
x ,..., m
x - controlled
variables; 1
y , 2
y ,..., n
y - uncontrolled variables or random
influence; k
q - restriction function. Assuming that criterion
of efficiency W is already chosen and there are two types
(W) as follows:
Threshold damage as a result of attack. Attack here is
considered implemented if damage is not less than
threshold. In this case, efficiency criterion is a task
performance probability and result can have only two
values: 1 – the attack task overcoming completed by the
system; or 0 – for the opposite case.
Secondly, result of countermeasures increases steadily
depending on damage increasing. In this case the goal of
attack is not achievement of defined result but
implementation of maximum damaging and efficiency
criterion will be calculated as mathematical expectation
damage.
3.3 Classification of Data Aggregation
Scheme.
Data aggregation helps to prevent data redundancy in the
network. As WSN's have high node densities, a node might
receive the same data from more than one neighbor [16].
The paper presents the data aggregation classification for
WSN, based on aggregation method of qiasi-parallelism.
Quasi-parallelism means parallelism of service events
which appear in system at the same time due to the
following advantages it has for the security:
• Ability to reduce the size of the data transmitted
through the network.
• Dynamic response to attack activities by executing of a
self-healing mechanism.
• Dynamic aggregator election/rotation mechanism to
balance the workload at aggregators.
These properties can support in providing accurate
aggregation results securely without exhausting the
network.
In case of close interconnections between system
components (Кi), and input signals of one component are
the output components of another components, its possible
do approximation between these system components
mathematically, which makes it possible to design imitate
model by module principle. If modules have its own unified
structure with input, output and can manage events then
these modules can be considered as aggregators (A).
Some system parts, input-output and information
transmitting channels can be aggregators as well. Thus,
aggregator is a function description of certain object in that
aspects which influence on efficiency estimation of given
system. Every aggregator has only input or output
messages. Aggregator behavior design is successive
transitions chain from one state to another. Therefore we
consider WSN security design as aggregation method of
quasi-parallelism. Figure 2 presents communications of
control program (CP) with aggregators where every
aggregator approximates corresponding functional action
( ,i jFA ). A functional action realizes independency from
each other.
Aggregators: 1 11 12 13 14
{ , , , }K FA FA FA FA
2 21 22 23
{ , , }K FA FA FA
3 31 32 33 34
{ , , , }K FA FA FA FA
Figure 2. Imitation process (aggregator’s activation process)
Every element has connection with another. We assume
that there are only mono-channels for information
transition in this scheme. А0 is an influenced environment
within-research system.
Example: Assume that 32
y is output signal of
aggregator 32
A . Then time for next activation and output
data list are set. Aggregator activation condition is set to
serve the aggregator. Then the commutation matrix should
be created for aggregators’ communication. Having output
signal 32
y CP detects input signal by commutation matrix
( 33
x ) and thus activates aggregator 33
A . When all output
signals ij
Y are served, the designed condition will finish its
checks. The condition set will comprise
1. Choosing minimum time ( ijt ) of aggregator states
which can be used to select parameter location and
aggregator’s activation number at that moment.
2. This aggregator’s number becomes initial value of
aggregators’ activation list and time model shift
occurs: 0
min ijj
t t ti = +
3. The list of activated aggregators will form, i.e.
aggregator activation moment which is equal to new
model time 0t which at the end of this process will
initiate activation of successful aggregators.
Aggregator j
Ai activation means to enable ij
A .
It is necessary to consider some conditions, for example
initial setting of aggregates states at 0t time, definition of
next event time and corresponding aggregator, definition of
new aggregator state and formation of input signals ij
Y as a
result of changing inside states, checking of output signals
and channel number by commutation matrix (R), defining
new aggregate state by the input signal which are coming
and form output signal.
Therefore, is reasonable to use Aggregator method of
imitate modeling with complex objects to secure WSN as
with WSN it’s feasible to take into consideration
commutations matrix making. However signal serving will
require additional machine time which is (key
disadvantage) but aggregate approach will allow
conveniently and strictly description of mathematical
objects. Complex systems designing often use the
following restriction; all component functional actions of
real system are different. That’s why the selection of quasi-
parallelism method was suitable to our approach. This
method is especially effective for objects with high-
specialization of certain operations. In our case consisting
of three components 1 2 3
, ,K K K it’ was convenient to
consider each component as separate processes each of
which describes one process class (setting process,
program-process and input-output process) to ensure
reliability of transmitted data.
4. PROBABILITY VERIFICATION OF
RELIBITY OF THE PROPOSED WSN
APPROACH
The guaranteed delivery of critical data is an essential
requirement in most Wireless Sensor Network (WSN)
applications. Illustrative examples are: battlefield
surveillance, intrusion detection and E-health monitoring
applications, where critical alerts must be timely and
reliably delivered to the monitoring stations that act on
those data; and industrial control applications, where
commands must be timely and reliably delivered to the
actuators (e.g., robotic arm). In this section we present
mathematical reliability proof for WSN:
( )br adv
W P P AP t= , (9)
where W is efficiency criterion which to our case is
dependence of efficiency on reliability, br
P - is probability
of system breaking without fault; adv
P - probability of
security systems overcome by adversary; A - availability;
( )P t - probability of reliable operation within t-time.
From (9)
( )nfo
P AP t= , (10)
where nfo
P - probability of reliable operation.
Subsequently
nfo
br adv
W
P
P P
= (11)
Using (11) we calculate nfo
P taking into consideration br
P ,
adv
P and availability
MTBF
A
MTBF MTTR
=
+
where MTBF and
MTTR are mean time between failure and corresponding
repair mean time, Mean Time between Failure (MTBF)
Mean Time To Repair (MTTR). Then probability
calculation of reliable operation depends on reliability of
each WSN’s component. We calculate it as follows:
( )*
,cl ch bs
P t P P P= (12)
where P*(t) is probability of reliable operation based on
reliability of each component, where clP , chP , bsP - are
probabilities of reliable operation clusters, interconnect
backbone and BS correspondingly [8, 13, 14].
Having these probabilities, we expect ( )*
P t to be
established. Comparing ( )*
P t with required value,
secured requirement measures can be assessed. Hence we
can determine reliability in the following two ways:
1. Exploitation of nodes lifetime with minimum
consumptions.
2. Maximum reliability requirements with given
exploitation cost.
Solving the mentioned problems above “reliability-cost”
direct searching approach can be used. Searching can be
implemented by dynamic programming principle with
maximization of objective function. This also is supposed
to be an opening for future research and part of
continuation of our work.
5. CONCLUSION
In Sensor Network environment security service are of
outmost concern to end user. Reliability to wireless sensor
network for security is studied in this paper. Our work
reveals that reliability is dependent on three elements:
connectivity, network parameters and Data aggregation.
Data aggregation can influence the information transmitted
within WSN in positive manner as illustrated in a proposed
scheme and these influences can be used to control end-to-
end reliability of information delivery. An intuitive
understanding of these relations and all the reliability
criteria in this paper can be feasible for a general network
parameter and security design.
6. REFERENCES
[1] Majeed A, Razak S., Ghazaleh A.B, A. Harras K.A 2009:
TCP over Multi-Hop Wireless Networks: The Impact of
MAC Level Interactions. ADHOC-NOW 2009: 1-15N.
[2] Boudriga N., Baghdadi M., Obaidat M.S, 2006 "A New
Scheme for Mobility, Sensing, and Security Management in
Wireless Ad Hoc Sensor Networks," anss, pp.61-67, 39th
Annual Simulation Symposium (ANSS'06).
[3] Perrig, A. Szewczyk .R, Wen V., Culler D. and Tygar J.D,
2001 .SPINS: Security protocols for sensor networks, Proc.
MOBICOM'2001, Rome, Italy.
[4] Choi J., Choi B.Y, Song S., Hui Lee K.H, 2010: NQAR:
Network Quality Aware Routing in Error-Prone Wireless
Sensor Networks. EURASIP J. Wireless Comm. and
Networking 2010
[5] Koul A., R.B. Patel R.B, Bhat V.K, 2009"Double Split Based
Secure Multipath Routing in Adhoc Networks," artcom,
pp.835-839, 2009 International Conference on Advances in
Recent Technologies in Communication and Computing.
[6] Zia T. and Zomaya A.; 2006. Security Framework for
Wireless Sensor Networks SAS – IEEE Sensors Applications
Symposium, Houston, Texas USA, 7-9 FebrA,
[7] Younis O. and Fahmy S. 2003. MOBICOM, Distributed
Clustering for Scalable, Long-; Lived Sensor Networks,
[8] Ibriq J. and Mahgoub I, 2004. Cluster-based routing in
wireless sensor networks: Issues and Challenges, SPECTS
‘04
[9] Taherkordi A., Alkaee M. T and Sharifi M. 2006.Achieving
Availability and Reliability in Wireless Sensor Networks
Applications, Proceedings of the First International
Conference on Availability, Reliability and Security
(ARES’06)
[10] Chiasserini C.F. and M. Garetto. 2004. Modeling the
Performance of Wireless Sensor Networks, IEEE
INFOCOM.
[11] Frolik J, 2004 .QoS Control for Random Access Wireless
Sensor Networks, WCNC / IEEE Communications Society
[12] Oreku G. S., Jiangzhong Li and Pazynyuk T., 2007. “An
application-driven perspective on wireless devises
security: the case of distributed denial-of-service (ddos)”,
Proceedings of the 2nd ACM workshop on Performance
monitoring and measurement of heterogeneous wireless and
wired networks, Pages: 81 - 83, Chania, Crete Island, Greece.
[13] Jang K.W, Lee S.H, Jun M.S, 2006"Design of Secure
Dynamic Clustering Algorithm using SNEP and ?TESLA in
Sensor network," ichit, vol. 2, pp.97-102, 2006 International
Conference on Hybrid Information Technology – Vol 2
(ICHIT'06)
[14] Kumar G. , R. Mritunjay and L. Gang-soo ; 2012
Implementation of Cipher Block Chaining in Wireless
Sensor Networks for Security Enhancement International
Journal of Security and Its Applications Vol. 6, No. 1,
January, 2012
[15] AboElFotoh H., Shazly M., Elmallah E., Harms J. On area
coverage reliability of wireless sensor networks. Proceedings
of the 36th Annual IEEE Conference on Local Computer
Networks (LCN ’11); Bonn, Germany. 4–7 October 2011;
pp. 584–592.
[16] Valada A., David K., Kantor G.; 2010 “Design and
Development of a Wireless Sensor Network System for
Precision Agriculture” CMU-RI-TR-10-21.
[17] Egeland G., Engelstad P. The availability and reliability of
wireless multi-hop networks with stochastic link failures.
IEEE J. Sel. Areas Commun. 2009; 27:1132–1146.

Contenu connexe

Tendances

WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...cscpconf
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...sangasandeep
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksIAEME Publication
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSIJNSA Journal
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toeSAT Publishing House
 

Tendances (18)

WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
 
A0320105
A0320105A0320105
A0320105
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
O010528791
O010528791O010528791
O010528791
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNSLSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANET
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 

En vedette

Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSNvik001ind
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsaviiandevil
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Duncan Purves
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 

En vedette (19)

Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSN
 
Enhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security ArchitectureEnhancing the Security in WSN using Three Tier Security Architecture
Enhancing the Security in WSN using Three Tier Security Architecture
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Projet MQTT
Projet MQTTProjet MQTT
Projet MQTT
 

Similaire à Reliability in wsn for security

Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworksIOSR Journals
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
G041124047
G041124047G041124047
G041124047IOSR-JEN
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chIJECEIAES
 
Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...IJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksIJERA Editor
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...IJNSA Journal
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdfVenu Madhav
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
 

Similaire à Reliability in wsn for security (20)

iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  NetworksSecure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor  Networks
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
G041124047
G041124047G041124047
G041124047
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
 
Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...Tactical approach to identify and quarantine spurious node participation requ...
Tactical approach to identify and quarantine spurious node participation requ...
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...
 

Dernier

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Dernier (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Reliability in wsn for security

  • 1. Reliability in WSN for Security: Mathematical Approach. George S. Oreku 1,2 1 Tanzania Industrial Reseach and Development Organization (TIRDO) P.O Box23235 DSM Tanzania 2 School of Information Technology North West University - Vaal Triangle Campus, 1900 South Africa, P.O.Box1174 vanderbijlpark +27 762378953 George.oreku@gmail.com ABSTRACT Modern wireless sensor networks require specific and high degree of security due to their limitation and versatility tasks. The absence of permanent infrastructure makes these networks suitable for many civilian applications. But their limited computational ability and battery resources restrictions makes them vulnerable to many kinds of attacks. This paper presents reliability in Wireless Sensor Network (WSN) information transmition, which can be used to exactly estimate the system working quality. The WSN reliability mathematical calculation approach presented in this paper gives insight on how to secure WSN through reliable backbone connectivity, reliable sensor network and data aggregation. Solutions to meet WSN security interconnectivity reliability, network reliability and data aggregation scheme for robust security systems designing also have been introduced. Keywords Networks, WSN Security, WSN, Design, Security, Data Delivery, Reliability. 1. INTRODUCTION Sensor networks are being deployed in situations where it is important to protect the message communication from eavesdropping or tampering. Wireless Sensor network (WSN) consists of sensor nodes which are deployed in versatile and often potentially hostile environment, responsible for sensing, processing, and transferring environmental information on the sensor field towards the sink node that is often referred to as BS (Base Station) as can be seen on figure one below. The absence of fixed infrastructure and cost effectiveness makes WSN ideal for civilian applications such as disaster relief, emergency rescue operations, patient monitoring, environmental control, military applications such as target identification and tracking as well as surveillance networks. These applications require that sensor networks offer a high degree of security. An adversary can thwart the work of any part of the network by perturbing the information produced, stopping production, or pilfering information to all what has been mentioned above as function or application of WSN. To reduce the vulnerability paper [1] argues that, the WSN design must balance traditional objectives such as energy efficiency, cost, and application level performance with security to the higher degree than attacker’s competence. The authors in [2] developed architecture and associated algorithms to build a self-organizing WSN system that is capable of detecting mobile targets using cooperative sensors that are randomly deployed in a physical environment. The primary focus presented in manuscript [3] is to providing security mechanisms that enables the secure operation of in-network processing, a key emerging theme in the design and deployment of WSN. Jones et al. in [4] described a WSN model and proposed a solution which uses parameterized frequency hopping and cryptographic keys to provide differential security services and readily applicable to WSNs having anonymous nodes that are unaware of location. Perrig et al also proposed SPINS [5], a general security infrastructure for WSN. The infrastructure consists of an encryption primitive; SNEP, and an authenticated streaming broadcast primitive, micro TESLA have been well discussed in [14]. In [6], an algorithm to reliably transfer data by using one-phase pull directed diffusion, a data-centric routing technique in WSNs have been presented. However the research in papers [7, 14] presents the ideas on how to improve and enhance security and performance of an Ad Hoc networks through a multipath routing strategy and cipher block chaining. Consequently, that makes us to believe that existing security mechanisms are inadequate, and new ideas are 978-1-4673-5285-7/13/$31.00 ©2013 IEEE
  • 2. needed. Fortunately, the new problems also inspire new research and represent an opportunity to properly address sensor network security from the start. Motivated with existing research gaps in WSN security we formulate our findings based on three main questions, where by first is what are the requirements for designing reliable security system? Second is how to estimate total WSN reliability which includes backbone interconnection and each WSN components and third is how to design mathematical model of reliable security system and calculate non-failure operation probability which we further examine in details from sections 3-4 below. We assume that the node failures are statistically independent and imagine that the node meantime- to-failure (MTTF) is relatively large compared to the message transmission time, the maximum propagation delay, and, the time required by the network to adapt to topology changes due to failures. Therefore the possible estimate of the operational probability is calculated as MTTF/ (MTTF+MTTR) as detailed in section four of the paper. The rest of the paper is organized as follow; Section 2 presents the requirements for WSN security and advantages of our approach. Proposed reliability approach and data aggregation for security is presented in section 3. The paper evaluates security verification of WSN mathematically and system working reliability in sections 4 and gives conclusion in section 5. 2. SECURITY REQUREMENTS FOR WSN In many ways security has been viewed as a stand alone component of a system’s architecture or afterthought, where a separate module provides security. This separation is, however, usually a flawed approach to network security. To achieve a secure system, security must be integrated into every component. In many cases not integrating security to components during system development design, component has turned to be a point of attack. As a result, security must pervade every aspect of system design. The proposed approach addresses several aspects, being very flexible and able to be easily adapted to different kinds of scenarios when compared with the available approaches in [15, 17] To design reliable WSN security system, we follow the reliability approach taking advantage of security requirements in a following sequence: 1. Complex parameters for reliability (operational availability coefficient, availability, operating efficiency); 2. Reliability requirements (reliability probability, average time before denial of service, on denial and on fault); 3. Time requirements (various time resources and life time); 4. Repairability requirements (time for repairing average active state (serviceable condition), time allowable for repair); 5 Different types of dependability measures which can be obtained from the same model (e.g., reliability, availability, MTTF) as well as the criticality of the network devices (Birnbaum’s measure). The reflection of reliability requirements noticed above gives us the general idea of setting up the calculation of WSN reliability through interconnected backbone, WSN component (sensor nodes) which characterizes quality of the total working system and data aggregation which can support in providing accurate aggregation results securely without exhausting the network. 3. COMPLEXITY OF WSN RELIBILITY We consider WSN as a complex system consists of three components: sensor nodes grouped to clusters, task manager node (user, base station) and interconnect backbone [8], as shown in Figure 1. below. Each Sensor Node contains various sensors and actuators that are used to collect let’s say environmental data, process and transmit them. Collected data are transferred to the base station through the network. Direct communication between individual nodes may be required sometimes. Base station performs tasks in data storage, analysis, display and control interface backbone interconnectivity. Due to less stringent limitations, it can perform significantly more complex tasks than WSN nodes. Figure 1. Wireless sensor network configuration architecture Therefore to calculate complex WSN reliability it’s important to compute the reliability of each WSN component (interconnected backbone and nodes organized to clusters [9, 10, 11]). We assume a sensor to be a device that possesses three basic capabilities: sensing, computing, and communicating. Sleeping sensor consumes essentially no energy [15]. In our scenario sensor network is connected to the outside world through a sink node while having a full range of computational and communication capabilities and a renewable power supply. From the presented scenario we introduce how we calculate interconnectivity reliability for transmission as follow in section 3.1 below.
  • 3. 3.1 Reliability of Interconnectivity Backbone To evaluate the reliability and availability of Wireless Sensor Networks our approach depends on bandwidth frequency of communication channel, signal power and noise relation. Therefore maximum transmitting channel bandwidth ( max C ) can be calculated as follow: max log (1 / )2C F P Ps n= + (1) where F – backbone interconnectivity frequency; sP – signal power, n P – noise power, (1 / )P Ps n+ – number of signal level which can be accepted by receiver. E.g., 3/s nP P = this means that power signal is more than noise power for three times; therefore single signal can transmit 4 values, i.e. log (1 3) 22 + = bites of data. We calculate minimum time cycle ( minT ) for signals transmission with F as follows: min 1 / (2 )T F= (2) Then number of unmistakably bites ( C ) transmitted in channel per sec can be computed as: 2 2 2 [1 log (1 ) log (1 )]C F p p p p= + + − − , (3) where p is probability of data distortion due to obstacles. This equation allows exactly estimation of interconnectivity backbone reliability. 3.2 Wireless Sensor network Reliability In this presentation, it is assumed that sensor data readings are sent towards a sink. Sensors are assumed to periodically send data. Thus, the amount of data readings generated per time interval in the sensor field is known. Additionally it is assumed that packet losses are independent of additional factors such as message size and traffic density. Increases in message size will increase the probability of bit errors within a message, but, note that in many forms of aggregation, packet size remains unchanged or does not change significantly. Therefore we define reliability of a WSN as the probability that a minimum aggregate rate of information ( nfo P ) that can be delivered to the sink node. However we characterize quality of the total working system by efficiency (W) which depends in some parameters including reliability calculation from [12] and estimate it as follows: ( )1 2 , ,..., ,n W f P P P R= (4) Where 1P , 2P ,..., nP - performance quality of WSN components; R - total reliability. If assuming that 0 W is effectiveness with absolute reliable system functioning, then 0ef W K W= . Where- efК means degree of degradation due to unreliability of WSN components. Effectiveness saving coefficient ( efК ) is taken as an initial factor when analyze system reliability: 0 .ef W К W = (5) The effectiveness saving coefficient for WSN is defined by character of exploitation circle. Exploitation circle of WSN can be presented as sequence of several conditions i.e. by ( )x t function. If ( ) 1x t = – serviceable condition; 0 – system denied or on repair. In this case, reliability estimation corresponds to some function, i.e. ( )i x t function, where i means particular system’s element. Because of active time state, serviceable condition and repair time which are taken as random values, and ( )i x t as a realization of random function ( )x t . So ( )i x t can be considered as mathematical operational model of WSN and named as realization of operational process. Then estimation of ith realization, i.e. functional ( )( )i x tφ , as a realization of random quantity ( )( )x tφ . And quantitative index of reliability R can be considered as operational mathematical of random quantity ( )( )x tφ which can be calculated as: ( )( )R M x tφ= (6) where ( )( )x tφ - operational mathematical of random quantity and where Μ is the required minimum number of sensor nodes. The WSN reliability and network parameters, especially network reliability and data acquisition rate. Can improve security from the point of system analysis to quality of services, maximum data transport quantity and quality over network nodes and backbone connectivity can be calculated to ensure the safety flow of the information through sensor nodes. In order to solve reliability problem task, i.e. finding total WSN reliability, we prove and analyze mathematically our approach as: ( )1 1 ,..., ; ,...,m n W f x x y y= (7) ( )1 1 ,..., ; ,..., 0k m n q x x y yψ= = , (8) Where W- criterion of efficiency; 1 x , 2 x ,..., m x - controlled variables; 1 y , 2 y ,..., n y - uncontrolled variables or random influence; k q - restriction function. Assuming that criterion
  • 4. of efficiency W is already chosen and there are two types (W) as follows: Threshold damage as a result of attack. Attack here is considered implemented if damage is not less than threshold. In this case, efficiency criterion is a task performance probability and result can have only two values: 1 – the attack task overcoming completed by the system; or 0 – for the opposite case. Secondly, result of countermeasures increases steadily depending on damage increasing. In this case the goal of attack is not achievement of defined result but implementation of maximum damaging and efficiency criterion will be calculated as mathematical expectation damage. 3.3 Classification of Data Aggregation Scheme. Data aggregation helps to prevent data redundancy in the network. As WSN's have high node densities, a node might receive the same data from more than one neighbor [16]. The paper presents the data aggregation classification for WSN, based on aggregation method of qiasi-parallelism. Quasi-parallelism means parallelism of service events which appear in system at the same time due to the following advantages it has for the security: • Ability to reduce the size of the data transmitted through the network. • Dynamic response to attack activities by executing of a self-healing mechanism. • Dynamic aggregator election/rotation mechanism to balance the workload at aggregators. These properties can support in providing accurate aggregation results securely without exhausting the network. In case of close interconnections between system components (Кi), and input signals of one component are the output components of another components, its possible do approximation between these system components mathematically, which makes it possible to design imitate model by module principle. If modules have its own unified structure with input, output and can manage events then these modules can be considered as aggregators (A). Some system parts, input-output and information transmitting channels can be aggregators as well. Thus, aggregator is a function description of certain object in that aspects which influence on efficiency estimation of given system. Every aggregator has only input or output messages. Aggregator behavior design is successive transitions chain from one state to another. Therefore we consider WSN security design as aggregation method of quasi-parallelism. Figure 2 presents communications of control program (CP) with aggregators where every aggregator approximates corresponding functional action ( ,i jFA ). A functional action realizes independency from each other. Aggregators: 1 11 12 13 14 { , , , }K FA FA FA FA 2 21 22 23 { , , }K FA FA FA 3 31 32 33 34 { , , , }K FA FA FA FA Figure 2. Imitation process (aggregator’s activation process) Every element has connection with another. We assume that there are only mono-channels for information transition in this scheme. А0 is an influenced environment within-research system. Example: Assume that 32 y is output signal of aggregator 32 A . Then time for next activation and output data list are set. Aggregator activation condition is set to serve the aggregator. Then the commutation matrix should be created for aggregators’ communication. Having output signal 32 y CP detects input signal by commutation matrix ( 33 x ) and thus activates aggregator 33 A . When all output signals ij Y are served, the designed condition will finish its checks. The condition set will comprise 1. Choosing minimum time ( ijt ) of aggregator states which can be used to select parameter location and aggregator’s activation number at that moment. 2. This aggregator’s number becomes initial value of aggregators’ activation list and time model shift occurs: 0 min ijj t t ti = + 3. The list of activated aggregators will form, i.e. aggregator activation moment which is equal to new model time 0t which at the end of this process will initiate activation of successful aggregators. Aggregator j Ai activation means to enable ij A .
  • 5. It is necessary to consider some conditions, for example initial setting of aggregates states at 0t time, definition of next event time and corresponding aggregator, definition of new aggregator state and formation of input signals ij Y as a result of changing inside states, checking of output signals and channel number by commutation matrix (R), defining new aggregate state by the input signal which are coming and form output signal. Therefore, is reasonable to use Aggregator method of imitate modeling with complex objects to secure WSN as with WSN it’s feasible to take into consideration commutations matrix making. However signal serving will require additional machine time which is (key disadvantage) but aggregate approach will allow conveniently and strictly description of mathematical objects. Complex systems designing often use the following restriction; all component functional actions of real system are different. That’s why the selection of quasi- parallelism method was suitable to our approach. This method is especially effective for objects with high- specialization of certain operations. In our case consisting of three components 1 2 3 , ,K K K it’ was convenient to consider each component as separate processes each of which describes one process class (setting process, program-process and input-output process) to ensure reliability of transmitted data. 4. PROBABILITY VERIFICATION OF RELIBITY OF THE PROPOSED WSN APPROACH The guaranteed delivery of critical data is an essential requirement in most Wireless Sensor Network (WSN) applications. Illustrative examples are: battlefield surveillance, intrusion detection and E-health monitoring applications, where critical alerts must be timely and reliably delivered to the monitoring stations that act on those data; and industrial control applications, where commands must be timely and reliably delivered to the actuators (e.g., robotic arm). In this section we present mathematical reliability proof for WSN: ( )br adv W P P AP t= , (9) where W is efficiency criterion which to our case is dependence of efficiency on reliability, br P - is probability of system breaking without fault; adv P - probability of security systems overcome by adversary; A - availability; ( )P t - probability of reliable operation within t-time. From (9) ( )nfo P AP t= , (10) where nfo P - probability of reliable operation. Subsequently nfo br adv W P P P = (11) Using (11) we calculate nfo P taking into consideration br P , adv P and availability MTBF A MTBF MTTR = + where MTBF and MTTR are mean time between failure and corresponding repair mean time, Mean Time between Failure (MTBF) Mean Time To Repair (MTTR). Then probability calculation of reliable operation depends on reliability of each WSN’s component. We calculate it as follows: ( )* ,cl ch bs P t P P P= (12) where P*(t) is probability of reliable operation based on reliability of each component, where clP , chP , bsP - are probabilities of reliable operation clusters, interconnect backbone and BS correspondingly [8, 13, 14]. Having these probabilities, we expect ( )* P t to be established. Comparing ( )* P t with required value, secured requirement measures can be assessed. Hence we can determine reliability in the following two ways: 1. Exploitation of nodes lifetime with minimum consumptions. 2. Maximum reliability requirements with given exploitation cost. Solving the mentioned problems above “reliability-cost” direct searching approach can be used. Searching can be implemented by dynamic programming principle with maximization of objective function. This also is supposed to be an opening for future research and part of continuation of our work. 5. CONCLUSION In Sensor Network environment security service are of outmost concern to end user. Reliability to wireless sensor network for security is studied in this paper. Our work reveals that reliability is dependent on three elements: connectivity, network parameters and Data aggregation. Data aggregation can influence the information transmitted within WSN in positive manner as illustrated in a proposed scheme and these influences can be used to control end-to- end reliability of information delivery. An intuitive understanding of these relations and all the reliability criteria in this paper can be feasible for a general network parameter and security design. 6. REFERENCES [1] Majeed A, Razak S., Ghazaleh A.B, A. Harras K.A 2009: TCP over Multi-Hop Wireless Networks: The Impact of MAC Level Interactions. ADHOC-NOW 2009: 1-15N.
  • 6. [2] Boudriga N., Baghdadi M., Obaidat M.S, 2006 "A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks," anss, pp.61-67, 39th Annual Simulation Symposium (ANSS'06). [3] Perrig, A. Szewczyk .R, Wen V., Culler D. and Tygar J.D, 2001 .SPINS: Security protocols for sensor networks, Proc. MOBICOM'2001, Rome, Italy. [4] Choi J., Choi B.Y, Song S., Hui Lee K.H, 2010: NQAR: Network Quality Aware Routing in Error-Prone Wireless Sensor Networks. EURASIP J. Wireless Comm. and Networking 2010 [5] Koul A., R.B. Patel R.B, Bhat V.K, 2009"Double Split Based Secure Multipath Routing in Adhoc Networks," artcom, pp.835-839, 2009 International Conference on Advances in Recent Technologies in Communication and Computing. [6] Zia T. and Zomaya A.; 2006. Security Framework for Wireless Sensor Networks SAS – IEEE Sensors Applications Symposium, Houston, Texas USA, 7-9 FebrA, [7] Younis O. and Fahmy S. 2003. MOBICOM, Distributed Clustering for Scalable, Long-; Lived Sensor Networks, [8] Ibriq J. and Mahgoub I, 2004. Cluster-based routing in wireless sensor networks: Issues and Challenges, SPECTS ‘04 [9] Taherkordi A., Alkaee M. T and Sharifi M. 2006.Achieving Availability and Reliability in Wireless Sensor Networks Applications, Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06) [10] Chiasserini C.F. and M. Garetto. 2004. Modeling the Performance of Wireless Sensor Networks, IEEE INFOCOM. [11] Frolik J, 2004 .QoS Control for Random Access Wireless Sensor Networks, WCNC / IEEE Communications Society [12] Oreku G. S., Jiangzhong Li and Pazynyuk T., 2007. “An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos)”, Proceedings of the 2nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, Pages: 81 - 83, Chania, Crete Island, Greece. [13] Jang K.W, Lee S.H, Jun M.S, 2006"Design of Secure Dynamic Clustering Algorithm using SNEP and ?TESLA in Sensor network," ichit, vol. 2, pp.97-102, 2006 International Conference on Hybrid Information Technology – Vol 2 (ICHIT'06) [14] Kumar G. , R. Mritunjay and L. Gang-soo ; 2012 Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement International Journal of Security and Its Applications Vol. 6, No. 1, January, 2012 [15] AboElFotoh H., Shazly M., Elmallah E., Harms J. On area coverage reliability of wireless sensor networks. Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN ’11); Bonn, Germany. 4–7 October 2011; pp. 584–592. [16] Valada A., David K., Kantor G.; 2010 “Design and Development of a Wireless Sensor Network System for Precision Agriculture” CMU-RI-TR-10-21. [17] Egeland G., Engelstad P. The availability and reliability of wireless multi-hop networks with stochastic link failures. IEEE J. Sel. Areas Commun. 2009; 27:1132–1146.