Loading

Confidentiality in Wireless Sensor Networks
B.Veeramallu1, S. Sahitya2, Ch. LavanyaSusanna3

1B.Veeramallu, department of computer science and engineering, KLUniversity.
2S.Sahitya, department of computer science and engineering, KLUniversity.
3Ch.LavanyaSusanna, department of computer science and engineering ,KLUniversity.
Manuscript received on January 01, 2013. | Revised Manuscript received on January 02, 2013. | Manuscript published on January 05, 2013. | PP: 471-474 | Volume-2, Issue-6, January 2013. | Retrieval Number: F1191112612/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: While much research has focused on making sensor networks that feasible and useful security has received little attention. We present a set of security protocols optimized for sensor networks: they are confidentiality and authentication, data freshness, data integrity. By using the Sensor Network Encryption Protocol we explains the basic primitives for providing confidentiality, authentication between the two nodes, data integrity and message freshness present in a wireless sensor network. That was designed as base component of Security Protocols for Sensor Networks. Here mainly two security properties are checked: authenticity and Confidentiality of similar messages components. That the first case is the communication between the networks nodes and base station in order to retrieve node Confidential information. In the second case is a key distribution protocol in a sensor network using SNEP (sensor network encryption protocol) for securing messages.
Keywords: Sensor networks, secure communication protocols, mobile ad hoc networks, authentication of wireless communication.