700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Research Article Open Access
Mobile sinks are the essential components in the operation of many sensor network applications.It plays a vital role in many wireless sensor network applications for efficient data accumulation, localized sensor reprogramming, for distinguishing and revoking compromised sensors. The problem of authentication and pair wise key establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks The attacker can easily take a control of the entire network by deploying a replicated mobile sinks. So that more computational cost and the life time of sensors are reduced. In order to overcome such a problem a multilevel security scheme is introduced to perform against the mobile sink replication attack. So the identification and isolation of replicated mobile sink from network is done by adding a destination sequence number along with mobile sink request message.This destination sequence number is known only to the source node.The source node receiving the mobile sink request message will detect whether the request is from the genuine mobile sink or the replicated one.The destination sequence number of 32bits consisits of two parts. First part is of counting the sequence of request message and the second part is to recognize whether request message is from the corresponding mobile sink.Whatever the number of second part be,the value of the first part is in the increasing order.The second part is assigned by a hash function,the first part and the MAC address of the node.The hash function can generate 160bits hash value by using MAC address of the mobile sink.The source node knows the MAC address of all the nodes in advance.To reduce the overhead of detecting the replicated mobile sink one byte of hash value is selected to determine the second part in each request message generation.Thus the throughput of the entire network is maintained whenever a replicated mobile sink sends request to the source node.Also the probabaility of number of compromised nodes decreases during the mobile sink replication attack.The requested data is being preserved from the requested source node to the replicated mobile sink. The throughput remains the same with genuine mobile sink having no increase with the amount of request send by the replicated mobile sink after the genunine mobile sink had sent the request.So that the mobile sink replication attack is maintained in the enhanced multilevel security scheme using the destination sequence number.