Sensor network lifetime and security are primary concern in sensor network design.
In order to enhance the network lifetime for a particular application, many routing
protocols (Rajiv Kumar, 2012) were devised. Information security is an important issue
in our information society. The availability of inexpensive radio transceivers has
enabled new types of applications and created new research challenges. In Wireless
Sensor Network (WSN), the waves are free to propagate in the space. This increases
the chances of waves getting hacked by the hacker. They are often deployed in large
quantities and in environments where they may be exposed to tampering,
eavesdropping and attempts to modify transmitted data and insert unauthorized messages into the network. Nodes are very much prone to attacks. It may be possible
that the attacker can hack the intermediate nodes and retrieve valuable information.
To counter such threats, flexible and effective mechanisms for secure communication
are essential.
More efficient techniques must be employed. Encryption (Darrel et al., 2004) is
one of the best tools to guarantee the security of sensitive information. It not only
provides the information’s security but also functions with digital signature,
authentication, secret sub-keeping system security, etc. Therefore, the purpose of
adopting encryption techniques is to ensure information integrity and confidentiality,
that is, prevent information from tampering, forgery and counterfeiting.
|