High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Wireless Sensor Network - Authentication Protocol for Military Surveillance

Author(s):

Varsha Jathar , Padre Conceicao College of Engineering; Louella Menezes Mesquita e Colaco, PCCE

Keywords:

Multimedia authentication, node security, wireless multimedia security, security protocol, wireless multimedia authentication protocol, source authentication

Abstract

Wireless sensor network are being used widely across various security applications such as monitoring, tracking, surveillance systems and also controlling the areas in military and battlefield. However widely used wireless networks are prone to unique security challenges such as node forgery, denial of service attack, and other hostile network attacks. In military surveillance system an intruder can introduce malicious nodes or manipulate the existing nodes to set up malicious node. To avoid participation of malicious node from joining the sensor network, a security consideration is required in the design of network protocol. Also military applications require multimedia data such as images, text or videos to be transmitted across the network area. In this paper, we propose a security protocol to provide authentication of nodes within the sensor network and perform multimedia transfer between source and destination. When deployed within network a high degree of security is achieved compared to conventional security applications. This paper implements ECC based authentication protocol suitable for military applications using wireless network where security is in demand.

Other Details

Paper ID: IJSRDV4I40773
Published in: Volume : 4, Issue : 4
Publication Date: 01/07/2016
Page(s): 1467-1470

Article Preview

Download Article