30-08-2017, 02:59 PM
Wireless Sensor Networks (WSN) is an excellent technology that provides great potential for situations such as battlefields and commercial applications such as construction, traffic inspection, intelligent home monitoring environments and many more scenarios. Safety is the most important challenge in wireless sensor networks. Sensor networks have no user control for each individual node and wireless environment. Basically some special security threats and WSN attacks are addressed in our article. Distributed cloning of sensors will be identified using this model. We implemented zero knowledge protocol (ZKP) for the verification of sending sensor nodes. When a single fingerprint is applied to each node, the clonic attack is addressed. In the wireless sensor network the transmission of crucial cryptographic information is treated by our model using ZKP.
Due to the advanced technology available now a few days for it to be possible to develop the sensor node in wireless networks. Basically, these types of nodes are compact and are attached with a variety of sensors and especially wireless. Minimum manual intervention and monitoring are performed after the deployment of these sensor nodes. However, there may be security issues as we deploy the nodes in the hostile environment and where there is no manual control of the nodes. Normally clone nodes in the network are one of the most important types of physical attack. It is easy for the adversary to identify authorized nodes, copy cryptographic information to make clones, and these clones are deployed back to the network using the commodity hardware and operating system. The limited appropriation of the general purpose safety protocol is due to these limitations.
Due to the advanced technology available now a few days for it to be possible to develop the sensor node in wireless networks. Basically, these types of nodes are compact and are attached with a variety of sensors and especially wireless. Minimum manual intervention and monitoring are performed after the deployment of these sensor nodes. However, there may be security issues as we deploy the nodes in the hostile environment and where there is no manual control of the nodes. Normally clone nodes in the network are one of the most important types of physical attack. It is easy for the adversary to identify authorized nodes, copy cryptographic information to make clones, and these clones are deployed back to the network using the commodity hardware and operating system. The limited appropriation of the general purpose safety protocol is due to these limitations.