scholarly journals User Integrity Protection Security Model for Enhanced Telemedicine For Healthcare Networks

2020 ◽  
Author(s):  
Nishu Gupta

The wireless sensor nodes utilizes the wireless channels in the frequency bands of the 802.11, 802.16, 802.15.4, 802.15.1 and other similar wireless standards. The wireless sensor networks are built of the small sensor nodes built upon the microcontroller platforms such as PIC, 8051, ARM, AVR, etc. During the periods when the WSN nodes are in working condition, they need secure cryptographic keys for secure propagation of the sensitive information. Efficient key management and distribution scheme play an important role for the data security in WSNs. Existing cryptographic key management and distribution technique usually consume higher amount of energy and put larger computational overheads on Wireless sensor nodes. The cryptographic keys are used on different communication levels of WSN communications i.e. neighbour nodes, cluster heads and base stations. A successful corporate key administration and distribution policy is required to keep up the security of the remote sensor systems. The problems described in the base papers are related to the requirement of energy efficient key exchange policies for WSNs. So to overcome the above problem there is a need to design the model to solve the key-problem of energy efficient and secure key exchange scheme. The proposed model has been found improved after the in-depth result analysis over the given scenario.

2017 ◽  
Vol 16 (4) ◽  
pp. 6889-6894
Author(s):  
Pankaj Kumar ◽  
Ramanjeet Singh

Wireless sensor network has revolutionized the way computing and software services are delivered to the clients on demand. Wireless sensor network is very important to the mankind. It consist of number of sensor called nodes and a base station. Nodes collect data and send to the base station. There are number of nodes which send data at a time. So, number of problems are occurred. Usually the WSNs are automated, that is they work without the human intervention. In such cases it becomes very crucial that the network must have the capability of self-healing security mechanism to handle with all the types of attacks. Without the use of security mechanism, the data can be altered or hacked by some intruder in the network. The nodes are connected with each other without a wired connection through the base stations, they are highly prone to the hacking attacks. WSNs are used to sense various environmental or other parameters which can be used to predict natural hazards, climatic changes or other types of data analysis. During the periods when the WSN nodes are in working condition, they need secure cryptographic keys for secure propagation of the sensitive information. The present research is focused on the design of energy efficient security mechanism for improved reliability in sensor based environment. The RSA encryption algorithm has used for encryption purposes.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Sensors ◽  
2014 ◽  
Vol 14 (9) ◽  
pp. 17621-17654 ◽  
Author(s):  
Xing Liu ◽  
Kun Hou ◽  
Christophe de Vaulx ◽  
Hongling Shi ◽  
Khalid Gholami

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Gulzar Mehmood ◽  
Muhammad Sohail Khan ◽  
Abdul Waheed ◽  
Mahdi Zareei ◽  
Muhammad Fayaz ◽  
...  

Wireless Sensor Network (WSN) is a particular network built from small sensor nodes. These sensor nodes have unique features. That is, it can sense and process data in WSN. WSN has tremendous applications in many fields. Despite the significance of WSN, this kind of network faced several issues. The biggest problems rising in WSN are energy consumption and security. Robust security development is needed to cope with WSN applications. For security purposes in WSN, cryptography techniques are very favorable. However, WSN has resource limitations, which is the main problem in applying any security scheme. Hence, if we are using the cryptography scheme in WSN, we must first guarantee that it must be energy-efficient. Thus, we proposed a secure hybrid session key management scheme for WSN. In this scheme, the major steps of public key cryptography are minimized, and much of the operations are based on symmetric key cryptography. This strategy extensively reduces the energy consumption of WSN and ensures optimum security. The proposed scheme is implemented, and their analysis is performed using different parameters with benchmark schemes. We concluded that the proposed scheme is energy-efficient and outperforms the available benchmark schemes. Furthermore, it provides an effective platform for secure key agreements and management in the WSN environment.


Sign in / Sign up

Export Citation Format

Share Document