Abstract : Abstract The security of wireless sensor networks (WSN s) is a critical issue due to resource constrained nature of Wireless Sensor Networks and their diversified application domain
Intelligent Security Agent (ISA) so that provided security is adaptive according to application domain, energy efficient and easy to implement in practice.
ISA uses cross layer interactions while keeping layered abstraction and minimum inter layer interactions. It provide a robust mechanism for component based security where we are emphasizing on securing all the components of WSN.
Introduction : Introduction WSNs are being employed in various real time fields like Military, Disaster detection and relief, industry, Environmental Monitoring and Agriculture Farming etc.
Due to diversity of so many real time scenarios, security for WSNs becomes a complex issue.
Because for each implementation, there are different type of
attacks possible and demands a different security level.
Major challenge for employing an efficient security scheme comes from the resource constrained nature of WSNs like size of
sensors, Memory, Processing Power, Battery Power etc. and also wireless channels is easily accessible by good citizens and attackers.
Design goal of WSN : Design goal of WSN Various design goals of WSN security are
Design should have minimum software bugs.
2)Component Based Security:-
Some kind of security measures must be provided to all the components of a system as well as to network.
3) Adaptive Security:-
depending on traffic characteristics and environment they have to adapt themselves.
4) QoS with Security:-
existing security designs can address only a small, fixed threshold number of compromised nodes; the security protection completely breaks down when the threshold is exceeded
5) Realistic Design:
trace analysis for all kind of practical attacks possible for a particular real time scenario.
Network Based Security : Network Based Security Network based security can be mainly characterized as
1)Security for fundamental Services:
ISA for a node will store reputation factor for all neighboring nodes and depending on the reputation it will forward a packet to that node.
2) Secure Routing :-
The routing algorithm which calculates link costs by
considering available energy, distance and bandwidth will be best suitable for a cost and energy efficient operation.
3) Security in Key Management:-
Among all key distribution schemes available right now, Key Pre-distribution is most appropriate for WSN
WSN also requires various authentication and encryption mechanisms but of different level.
5) Intrusion Detection:-
To understand how cooperating adversaries might attack the system.
Conclusion : Conclusion Cross layer optimizations for energy efficient operations and added a new component ISA in system structure of a node.
ISA has its predefined knowledge base, on which it provides different security measures and what type of security level a node should use, given some percept conditions.
We used ISA to reduce redundant security and to encourage cross layer operations
success and robustness of ISA depends on prespecified policies and recommendations.
While specifying policies for ISA, it will be interesting to see, how we trade off between cost, energy and security level.