Intruder Detection by Visual Cryptography in Wireless Sensor Networks

被引:0
|
作者
Singh, Jitendra [1 ]
Kumar, Rakesh [2 ]
Kumar, Vima [1 ]
Mishra, Ajai [1 ]
机构
[1] Madan Mohan Malviya Univ Technol, Gorakhpur 273010, Uttar Pradesh, India
[2] Madan Mohan Malviya Univ Technol, Dept Comp Sci & Enggering, Gorakhpur 273010, Uttar Pradesh, India
关键词
Base Station; Intruder Detection; visual cryptography; Wireless Sensor Networks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this modern era of technology wireless sensor networks have broad area of applications. Various applications of sensor network needs the communication to be authenticated and secured. Researchers have developed many schemes for intruder detection in WSNs, but those schemes are very complicated and require complex encryption and decryption process for intruder detection. In this paper we proposed a intruder detection scheme based on (1, n) visual cryptography in which we use secure image which is partitioned into master share and ownership shares for verifying the authentication of sensor nodes. We believe that proposed technique will take fewer amounts of time and energy for intruder detection and possibly will detect all intruders in wireless sensor network. Main purpose of this paper is to introduce the use of visual cryptography in WSNs.
引用
收藏
页码:1422 / 1425
页数:4
相关论文
共 50 条
  • [2] On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks
    Ngai, Edith C. H.
    Liu, Jiangchuan
    Lyu, Michael R.
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 3383 - 3389
  • [3] On Trajectory Design for Intruder Detection in Wireless Mobile Sensor Networks
    Nurellari, Edmond
    Licea, Daniel Bonilla
    Ghogho, Mounir
    Rivero-Angeles, Mario Eduardo
    Nurellari, Edmond (enurellari@lincoln.ac.uk), 1600, Institute of Electrical and Electronics Engineers Inc. (07): : 236 - 248
  • [4] On Trajectory Design for Intruder Detection in Wireless Mobile Sensor Networks
    Nurellari, Edmond
    Licea, Daniel Bonilla
    Ghogho, Mounir
    Rivero-Angeles, Mario Eduardo
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2021, 7 : 236 - 248
  • [5] Lifetime maximization of wireless sensor networks while ensuring intruder detection
    Corapsiz, Muhammed Fatih
    SOFT COMPUTING, 2024, 28 (5) : 4197 - 4215
  • [6] Lifetime maximization of wireless sensor networks while ensuring intruder detection
    Muhammed Fatih Çorapsız
    Soft Computing, 2024, 28 : 4197 - 4215
  • [7] Sensor data cryptography in wireless sensor networks
    Aysal, Tuncer Can
    Barner, Kenneth E.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) : 273 - 289
  • [8] Big data analytic architecture for intruder detection in heterogeneous wireless sensor networks
    Mohapatra, Suvendu Kumar
    Sahoo, Prasan Kumar
    Wu, Shih-Lin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 236 - 249
  • [9] Border Surveillance and Intruder Detection Using Wireless Sensor Networks: A Brief Survey
    Arjun, D.
    Indukala, P. K.
    Menon, K. A. Unnikrishna
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 1125 - 1130
  • [10] Detection of Intruder using KMP Pattern Matching Technique in Wireless Sensor Networks
    Kalnoor, Gauri
    Agarkhed, Jayashree
    6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 187 - 193