By Topic

Security Authentication through AES and fine-grained distributed Data Access Control using clustering in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Velayutham, R. ; Dept. of CSE, Einstein Coll. of Eng., Tirunelveli, India ; Suganya, J.M.

Wireless Sensor Networks have been a significant area in the research of Security Authentication and the Data Access Control. This paper presents a distributed data access control scheme fine-grained access control over sensor data which is resistant against strong attacks such as sensor compromise and user colluding. Here a new security mechanism proposed in the defined clustering schema which includes base station, cluster heads and the sensor nodes. Here the data are transmitted using the cluster head instead of direct transmission from individual sensor nodes to the base station and thus, the energy conserved for the sensor nodes are much reduced which paves the way for long time data transmission. Distributed Cluster Heads and Base station are designed using the NS2 Simulation Environment. The proposed scheme exploits an Advanced Encryption Standard (AES) with CCMP (CBC-MAC), which improvises, adapts and stabilizes the WSNs with respect to both performance and security requirements. This paper gives insight and improvement to realize distributed fine-grained data access control in clustered environment & the symmetric encrypted procedures using AES with CCMP.

Published in:

Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on

Date of Conference:

26-28 July 2012