Abstract
Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bag, S., Dhar, A., Sarkar, P.: 100% connectivity for location aware code based KPD in clustered WSN: merging blocks. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 136–150. Springer, Heidelberg (2012)
Bera, S.C., Chakrabarty, S.: Study of magneto-optic element as a displacement sensor. Measurement 44(9), 1747–1752 (2011)
Chakrabarty, S., Bera, S.C.: Magneto-optic over-current detection with null optical tuning. Sens. Transducers 87(1), 52–62 (2008)
Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)
Çamtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Technical report, Rensselaer Polytechnic Institute, Rensselaer Polytechnic Institute, Lally 310110, 8th Street, Troy, NY 12180–3590 (2005). http://www.cs.rpi.edu/research/pdf/05-07.pdf. Last Accessed: July 14, 2014
Chakrabarti, D., Seberry, J.: Combinatorial structures for design of wireless sensor networks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 365–374. Springer, Heidelberg (2006)
Lee, J.-Y., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)
Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: WCNC, pp. 1200–1205 (2005)
Mahish, P., Chakrabarty, S.: Study of magneto optic sensor using TDG element. Int. J. Innovative Res. Electr. Electron. Instrum. Control Eng. (IJIREEICE) 1(6), 254–258 (2013)
Moteiv Corporation. Tmote sky: Datasheet (2006). http://www.eecs.harvard.edu/konrad/projects/shimmer/references/tmote-sky-datasheet.pdf, Last Accessed: July 14, 2014
Paterson, M.B., Stinson, D.R.: A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Cryptography 71(3), 433–457 (2014)
Ren, K., Lou, W., Zhang, Y.: LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 7(5), 585–598 (2008)
Rohde and Schwarz. R&S\(^{\textregistered }\) CMW500 Wideband Radio Communication Tester (2009). http://d3fdwrtpsinh7j.cloudfront.net/Docs/datasheet/rs_cmw500_overview.pdf, Last Accessed: July 14, 2014
Sarkar, P., Chowdhury, M.U.: Key predistribution scheme using finite fields and reed muller codes. In: Lee, R. (ed.) Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2011. SCI, vol. 368, pp. 67–79. Springer, Heidelberg (2011)
Sarkar, P., Saha, A., Chowdhury, M.U.: Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes. In: MASS, pp. 507–512 (2010)
Simonova, K., Ling, A.C.H., Wang, X.S.: Location-aware key predistribution scheme for wide area wireless sensor networks. In: SASN, pp. 157–168 (2006)
Wei, R., Wu, J.: Product construction of key distribution schemes for sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 280–293. Springer, Heidelberg (2004)
Acknowledgement
This work is partially done during Morshed Chowdhury’s visit at Kouichi Sakurai’s laboratory in Kyushu University-Ito Campus, Fukuoka, Japan, in June 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Sarkar, P., Mahish, P., Chowdhury, M.U., Sakurai, K. (2015). Securing Sensor Networks by Moderating Frequencies. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 153. Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-23802-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23801-2
Online ISBN: 978-3-319-23802-9
eBook Packages: Computer ScienceComputer Science (R0)