Journal Title : International Journal of Modern Trends in Engineering and Science
Volume 03 Issue 01 2016
ISSN no: 2348-3121
Page no: 1-4
Abstract – Wireless sensor networks are susceptible to a wide range of attacks. Some wireless sensor networks preclude the constant presence of a centralized data collection point, that is, a sink. In such a disconnected or unattended setting, nodes must accumulate sensed data until it can be off loaded to an itinerant sink. Furthermore, if the operating environment is hostile, there is a very real danger of node and data compromise. The unattended nature of the network makes it an attractive target for attacks that aim to learn, erase, or modify potentially valuable data collected and held by sensors. We argue that adversarial models and defense techniques in prior WSN literature about security are unsuitable for the unattended WSN setting. We define a new adversarial model by taking into account special features of the UWSN environment. We show that in the presence of a powerful mobile adversary, we focus on intrusion resilience in mobile unattended wireless sensor networks, where sensors move according to some mobility models. By using IDR protocol and AES secure the information.
Keywords— WSN; Sink; UWSN; Mobility Models; IDR
 R.Ostrovsky and M.Yung, “How to Withstand Mobile Virus Attacks,” ACM PODC ’91, 1991.
 Y.Frankel et al., “Proactive RSA,” Crypto‘97, 1997.
 T.Rabin, “A Simplified Approach to Threshold and Proactive RSA,” Crypto ’98, 1998.
 J.Deng et al., “A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks,” IEEE SecureComm ’05, 2005.
 M.Bellare and S.Miner, “A Forward Secure Digital Signature Scheme,” Crypto ’99, Aug. 1999.