Related worksThe key management problem is a bigger problem in the sensor field. Each sensor node is needed to transmit the node, so only the data is reached to the base station, so each sensor node within a group needs keys to transmit the data. While the attacker has entered and also gets full access to the sensor node and is ready to hack the data, but he has to wait. Since the node does not have any keys at that time, during transmission only nodes get access to the keys from the cluster head. A cluster with a variety of groups in the network and each group is specified using their names. All groups have the number of nodes to transmit information over the network. Pairwise keying between sensor nodes is even more difficult to manage. Attackers cannot easily manage sensor nodes, they need to gain full access to the node and also try to gain access to the cluster. But the cluster will not allow the group to be compromised and the cluster head will provide the duplicate data, if the attacker causes any kind of problem to the sensor nodes. Recent advances in wireless technology provide the security to block attackers and also eliminate attackers in the network. But in this paper the new technique is provided to manage the attacker using duplicate data as the backbone and also using dynamic key management in this system to provide the stronger data security in wireless sensor network (WSN). So attackers get confused in finding the original data. They don't know that the original data is sent securely to the base station. The key task of this paper is to avoid data loss in the network and also to provide...... middle of paper......mobile Insert the replica into the wireless sensor network and authenticate it with the distribution of keys" (IJERT), ISSN:2278-0181, vol. 2 Issue 6, June 2013.[7]BJ Culpepper and HC Tseng, "Sinkhole Intrusion Indicators in DSR MANETs", Proc. First Int. Conf. Broadband Networks (Broad-Nets '04), pp.681-688, October 2004.[8]Y. Li, Y. Lu, and S. Bagchi, "Efficient data collection of sensors in remote fields using mobile collectors", Proc. 13th Int. Conf. Computer Communication and Networks (ICCN '04), October 2004.[9]A. Rasheed and R. Mahapatra, “An efficient key distribution scheme for establishing pairwise keys with a mobile sink in distributed sensor networks,” Proc. IEEE 27th Int'l Performance Computing and Comm. Conf. .(IPCCC '08), pp. 264-270, December 2008.[10]L. Lamport, "Password authentication with insecure communication", Comm. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
tags