Security Solution for WSN Using Mobile Agent Technology 6
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Sep to Oct Issue 2011 by IJCTT Journal|
|Volume-2 Issue-1 |
|Year of Publication : 2011|
|Authors : Ashish Kumar Srivastava , Aditya Goel.|
Ashish Kumar Srivastava , Aditya Goel. "Security Solution for WSN Using Mobile Agent Technology 6"International Journal of Computer Trends and Technology (IJCTT),V2(1):244-248 May to June Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: Wireless sensor network (WSN) have diverse field of application, but it is very much prone to the security threats. The different types of security attack which limits its application in various unsecure environments are sink Hole Attack, Sybil attack, wormhole attack, node replication attack etc. Any security measures need to provide four basic requirements that are Confidentiality, Integrity, Authentication and Availability (CIAA). This paper focuses on the study of security threats to the WSN and based on that threats paper proposes a novel security solution using a mobile agent technology.
 S. Ganeriwal, S. Capkun, C.-C. Han, and M. Srivastava, “Secure time synchronization service for sensor networks,” in Proceedings of the 4th ACM workshop on Wireless security (WiSe ’05), 2005, pp. 97–106.
 Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou “Sensor Network Security: A Survey “ ieee Communications Surveys & Tutorials, Vol. 11, No. 2, Second Quarter 2009
 Hankerson, D.,Hernandez, L. J., and Menezes A. Software implementation of elliptic curve cryptography over binary fields, CHESS 2000,LNCS 1965, 1-24,2000.
 D. Hankerson, A. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer, 2004.
 I.F. Akyildiz , et al., "A Survey on Sensor Networks," IEEE Communications Magazine, vol. 40, no. 8 ,pp. 102-114, 2002.
 Blumenthal J, et al., “Wireless sensor networks—New challenges in software engineering”, IEEE, pp. 551–556, 2003.
 ZHANG Yi and ZHU Lina and FENG Li “Key Management and Authentication in Ad Hoc Network based on Mobile Agent” Journal of Networks, Vol. 4, No. 6, August 2009.
 S.Poornima and B.B.Amberker, “Agent Based Secure Data Collection in Heterogeneous Sensor networks”, in proc. of Second International Conference on Machine Learning and Computing IEEE Computer Society of 2010 pp.116-120.
 Johnson C. Lee And Victor C. M. Leung, University Of British Columbiakirk H. Wong, Jiannong Cao, And Henry C. B. Chan,Hong Kong Polytechnic University Key Management Issues In Wireless Sensor Networks:Current Proposals And Future Developments IEEE Wireless Communications October 2007.pp76-84
KeywordsWSN, mobile Agent, WSN Security.