Cluster forming based on spatial information using HMAC in WSN

The wireless sensor can be considered as one of the most major technologies through using it in different application such as environmental applications, military applications, commercial applications, health applications and agriculture applications. Due to the sensor networks may be deployed in o...

Full description

Saved in:
Bibliographic Details
Main Author: Aso Ahmed Majeed
Format: Article
Language:English
Published: Tikrit University 2023-01-01
Series:Tikrit Journal of Pure Science
Subjects:
Online Access:https://tjpsj.org/index.php/tjps/article/view/801
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849319544308367360
author Aso Ahmed Majeed
author_facet Aso Ahmed Majeed
author_sort Aso Ahmed Majeed
collection DOAJ
description The wireless sensor can be considered as one of the most major technologies through using it in different application such as environmental applications, military applications, commercial applications, health applications and agriculture applications. Due to the sensor networks may be deployed in open area (uncontrolled area), especially in military applica­tions. In such situ­ations, the nodes are vulnerable to be captured. Moreover, data/control packets may be inter­cepted and/or modified due to the transmission nature. Consequently, security services such as authentication and encryption done by key manage­ment which is not trivial task. The key management is important to maintain the network op­erations. The proposed scheme the nodes based on spatial information with data sequence then sends encryption message to each other in secure way by HMAC for providing safe links between the nodes in the network and forming the clusters. Consequently, the proposed scheme covers the security goals and au­thentication of each node.
format Article
id doaj-art-e578ea179c5d46589a258f29655bb89a
institution Kabale University
issn 1813-1662
2415-1726
language English
publishDate 2023-01-01
publisher Tikrit University
record_format Article
series Tikrit Journal of Pure Science
spelling doaj-art-e578ea179c5d46589a258f29655bb89a2025-08-20T03:50:25ZengTikrit UniversityTikrit Journal of Pure Science1813-16622415-17262023-01-0122610.25130/tjps.v22i6.801Cluster forming based on spatial information using HMAC in WSNAso Ahmed Majeed The wireless sensor can be considered as one of the most major technologies through using it in different application such as environmental applications, military applications, commercial applications, health applications and agriculture applications. Due to the sensor networks may be deployed in open area (uncontrolled area), especially in military applica­tions. In such situ­ations, the nodes are vulnerable to be captured. Moreover, data/control packets may be inter­cepted and/or modified due to the transmission nature. Consequently, security services such as authentication and encryption done by key manage­ment which is not trivial task. The key management is important to maintain the network op­erations. The proposed scheme the nodes based on spatial information with data sequence then sends encryption message to each other in secure way by HMAC for providing safe links between the nodes in the network and forming the clusters. Consequently, the proposed scheme covers the security goals and au­thentication of each node. https://tjpsj.org/index.php/tjps/article/view/801Heterogeneous WSNSymmetric Key cryptographySHA-1MACAttack in WSN
spellingShingle Aso Ahmed Majeed
Cluster forming based on spatial information using HMAC in WSN
Tikrit Journal of Pure Science
Heterogeneous WSN
Symmetric Key cryptography
SHA-1
MAC
Attack in WSN
title Cluster forming based on spatial information using HMAC in WSN
title_full Cluster forming based on spatial information using HMAC in WSN
title_fullStr Cluster forming based on spatial information using HMAC in WSN
title_full_unstemmed Cluster forming based on spatial information using HMAC in WSN
title_short Cluster forming based on spatial information using HMAC in WSN
title_sort cluster forming based on spatial information using hmac in wsn
topic Heterogeneous WSN
Symmetric Key cryptography
SHA-1
MAC
Attack in WSN
url https://tjpsj.org/index.php/tjps/article/view/801
work_keys_str_mv AT asoahmedmajeed clusterformingbasedonspatialinformationusinghmacinwsn