2016 International Journal of Pharmacy & Technology   unpublished
The main objective of this paper is security in sensor networks. In general sensor networks are launched at high sensitive areas such as war fares where apart from the performance of the network, the security constraint is to be seriously considered. Though there are some security protocols like μ TESLA, SNEPdeveloped with concern to the sensor nodes that possess limited resources like memory, computation power, battery, and network bandwidth, these security protocols only provide
more » ... ovide authentication and confidentiality to the messages passed by the sensor nodes but the real toughest of the attacks that is hard to deal. Hence, node capturing effect where an enemy acquires full control over sensor nodes through direct physical contact and can obtain confidential information such as the network topology, encryption passwords and may also use the captured node to mislead the other nodes as well as the server node. Since we cannot practically demand an efficient access control to thousands of nodes distributed in a large territory and as it is very difficult to assure tamper-resistance requirements as the sensor nodes frequently need to be inexpensive to justify their use, there is more chance for the enemies to attack using this technique. In order to handle this type of issue, we introduce a self destruction mechanism to the sensor nodes where if a node is identified to be under this attack, self destructs itself and protects the valuable information from getting into the hands of enemies.