Enhanced Security Technique For Wireless Sensor Network Nodes
Wireless sensor network (WSN) have become a complete solution in making use of low power implementation and embedded systems. Many different security protocols have been proposed that allow some form of security enhancement but not implemented. The shortfalls for most of the applications resides in the many restraints arising from low communication range, limited computing power, lack of availability of networking protocol, programming in the absence of certainty and security lapses in the areas of confidentiality, integrity and availability. A novel security technique and its functionality for WSN nodes have been proposed. These algorithms proved successful in sensor network region where the base station is secured and applications rate requirement can be easily anticipated. This research first analyses the lapses of Blom’s key, especially in the area of storing information in every single node as this will increase the memory capacity of the sensor node. The pairwise key was generated and implemented in the simulation resulting in the key predistribution and key allocation at the base station. Therefore, K pairwise key that was generated must be compromised before every shared key can be computed by an intruder. Therefore, new nodes were evaluated without breaking down the network, giving sufficient scalability by proposing a mechanism for generating and allocating K keys at the base station. An alternative security mechanism was also proposed. It involves a modification of micro Internet Protocol (uIP) open source stack to accommodate the sensor nodes code using the key distribution method as basis for routing mechanism. This method provides security for the IP address in sensors without creating problems of overhead, and memory capacity.
The research concludes by presenting recommendations to improve the security of wireless sensor system. This also provides an incentive for application security designers whereby they would not need to update information on every single node, permitting scalability without breaking down the running network
About the speaker
Celestine Iwendi obtained a BSc and MSc in Electronics and Computer Engineering from Nnamdi Azikiwe University Nigeria, MSc Communication Hardware and Microsystems from Uppsala University Sweden and is currently a Doctoral candidate at the school of Engineering University of Aberdeen, Scotland. He has carried out many Independent and supervised designs that apply knowledge of Signal processing and Communications engineering to analyze and solve problems at Nnamdi Azikiwe University, Awka Nigeria, and Nigerian Telecommunication (Nitel), Uppsala University Sweden, Norwegian University of Science and Technology, Norway and University of Aberdeen, Scotland. Celestine is also an Associate at the centre for Sustainable International Development. His research centres on Security of Wireless Sensor Network nodes.