Affiliation:
1. Department of Computer Applications, SSMRV College, Bangalore, India
Abstract
Transmitting data using the wireless medium provides a greater opportunity for the adversary to introduce different kinds of attacks into the network. Securing these monitoring devices deployed in unattended environments is a challenging task for the investigator. One of the preliminary practices adopted to ensure security is authentication. The chapter uses a new authentication procedure to evaluate the nodes. It uses sensors of a different caliber. Static and mobile nodes are used to bring the thought into play. The mobile nodes in the network demand vigorous defense mechanisms. The chapter defines a new authentication algorithm engaging itself to validate the communicating parties. The work is devised to substitute new nodes into the cluster to foster prolonged working of the network. By adopting the proposed protocol, backward and forward secrecy is preserved in the network. The work assures the security of the nodes by minimizing forge and replay attacks.