Enhanced Security Protocol in Wireless Sensor Networks


  • Trilok C. Aseri PEC University of Technology Computer Science & Engineering Department House No. 808, PEC Campus, Sector-12, Chandigarh-160012 (India)
  • Neha Singla PEC University of Technology Computer Science & Engineering Department House No. 808, PEC Campus, Sector-12, Chandigarh-160012 (India)


data freshness, protocol, security, wireless sensor network


The need for security in communications is in fact not new. This need has existed in military communications for thousands of years. In this paper, we focus on network protocols that provide security services. Wireless sensor network is an emerging technology that shows applications both for public as well as military purposes. Monitoring is one of the main applications. A large amount of redundant data is generated by sensor nodes. This paper compares all the protocols which are designed for security of wireless sensor network on the basis of security services and propose an improved protocol that reduces communication overhead by removing data redundancy from the network. By using the message sequence number we can check whether it is old message or new message. If the message is old then no need to send that message thereby reducing overhead. It also integrates security by data freshness in the protocol.


J.P. Walters, Zh. Liang, W. Shi, V. Chaudhary, Security in Distributed, Grid, and Pervasive Computing, Chapter 17, CRC Press, 2006.

A. Perrig, R. Szewczk, J.D. Tygar, V.Wen, D.E. Culler, SPINS: Security Protocols for Sensor Networks, Wireless Networking, Vol. 8, No. 5, pp. 521-534, Sept 2002. http://dx.doi.org/10.1023/A:1016598314198

A. Perrig, R. Canneti, J. D. Tygar, D. Song, The TESLA Broadcast Authentication Protocol, CryptoBytes, Vol. 5, No. 2, pp. 2-13, 2002.

D. Boyle, T. Newe, Security Protocols for use with Wireless Sensor Networks: A Survey of Security Architectures, Proceedings of the 3rd International Conference on Wireless and Mobile Communications, Guadeloupe, French Caribbean, pp. 54, 04-09 March 2007. http://dx.doi.org/10.1109/icwmc.2007.80

S. Madden, M.J. Franklin, J.M. Hellerstein, W. Hong, TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks, Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI), Boston, Massachusetts, USA, pp. 131-146, 09-11 December 2002. http://dx.doi.org/10.1145/1060289.1060303

S. Madden, R. Szewczyk, M.J. Franklin, D. Culler, Supporting Aggregate Queries Over Ad- Hoc Wireless Sensor Networks, Proceedings of the 4th IEEE Workshop on Mobile Computing and Systems Applications (WMCSA), Callicoon, NY, USA, pp. 49-58, 20-21 June 2002. http://dx.doi.org/10.1109/MCSA.2002.1017485

C. Karlof, N. Sastry, D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, pp. 162-175, 03-05 November 2004. http://dx.doi.org/10.1145/1031495.1031515

ZigBee Alliance, ZigBee Security Specification Overview, [Online] Available: http://www.zigbee.org/en/events/documents/december2005_open_house_presentations/ zigbee_security_layer_technical_overview.pdf.

J. Heo, C.S. Hong, Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment, Proceedings of the 1st IEEE International Symposium on Wireless Pervasive Computing, Phuket, Thailand, pp. 1-5, 16-18 January 2006.



Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.