Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

WIRELESS SENSOR NETWORKS PROTOCOL ANALYSIS AND PERFORMANCE SIMULATION

Author : ANTO JESSY MARY.A 1 ARULRAJ 2

Date of Publication :7th February 2015

Abstract: Wireless Sensor Networks (WSN) are wireless networks composed of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. Each sensor node in a sensor network is typically equipped with a radio transceiver or other wireless communication device, a small microcontroller, and an energy source, usually a battery. The security analysis and performance simulation show that ROSS not only achieves the predefined security goals, but also allows a tradeoff between security and performance cost. In three new mechanisms in the framework of random key redistributions were proposed to address the bootstrapping problem, namely the q-composite scheme, the multipath reinforcement scheme, and the random pair wise scheme. Each of these three schemes represents a different tradeoff in the design space of random key protocols.

Reference :

    1. X. Cao and G. Chen, (2007) “ROSS: Resource Oriented Security Solution for Heterogeneous Clustered Sensor Networks,” Int. J. of Intelligent Control and Systems, 12(4):317- 324,.
    2. H. W. Chan, A. Perrig, and D. Song, (2003)“Random Key Predistribution Schemes for Sensor Networks,” in: Proceedings of IEEE Symp. on Security and Privacy, 197-215, Berkeley, CA
    3. M. Eltoweissy, M. Heydari, L. Morales, and H. Sudborough, , (2004) “Combinatorial Optimization for Key Management in Secure Multicast Environments,” Journal of Network and System Management, 12(1):33- 50.
    4. M. Eltoweissy, M. Younis, and K. Ghumman, (2004) “Lightweight Key Management for Wireless Sensor Networks,” IEEE International Conference on Performance Computing and Communications, 813- 818.
    5. L. Eschenauer, Virgil.D Gligor, (2002) “A Key Management Scheme for Distributed Sensor Networks,” in: Proceedings of the 9th ACM Conference on Computer and Communication Security, Washington DC.
    6. Q. Gu, and J. Drissi,(2007) Localized Broadcast Authentication in Large Sensor Networks, Int. J. of Intelligent Control and Systems, 12(4): 341- 350.
    7. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan,(2000) “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” in: Proceedings of the 33rd Annual Hawaii Int‟l Conf. on System Sciences. Maui: IEEE Computer Society, 3005−3014,.
    8. G. Jolly, M. Kuscu, P. Kokate, and M. Younus, (2003) “A Low-Energy Key Management Protocol for Wireless Sensor Networks,” in: Proceedings of the 8th IEEE Symposium on Computer and Communications (ISCC), Antalya, 335-340. 

Recent Article