A Security Framework for Replication Attacks in Wireless Sensor Networks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5
Abstract
Mobile sinks play a great role in many Wireless Sensor Network applications for efficient data accumulation, localized sensor reprogramming and for collecting data from various sensor nodes across the globe. However, in sensor networks that make use of the existing three tier security framework, elevates a new security challenge i.e an attacker can easily create a replicated node and can gain control of the data in the network. Although the three-tier security framework is more resilient to mobile sink replication attacks, it is weak against access point replication attacks. To reduce the damage caused by access node replication attack, strengthening the authentication mechanism between the sensors and access nodes is vital. For this purpose, the single polynomial pool is converted to a double polynomial pool for providing security over the existing system. Also, security is increased by separating the access points into two layers namely, access nodes-D and access nodes-I along with a more secure authentication mechanism called WHIRLPOOL that produces a 512 bit encrypted text using Miyaguchi-Preneel scheme of cipher text generation.Our proposed algorithm ensures the necessary security mechanism for Wireless Sensor Networks and also does not degrade the performance of quality of service.
Authors and Affiliations
T. Subramani, S. Varma, R. Kabileshwaran
(MCKIBBEN’S MUSCLE) Robots Make Our Work Lighter, But We Have Made the Robots Lighter.
: Industrial robots, which are heavy moving bodies, show high risk of damage when working and also sessions in dense environment of other robots. This initiated the allure for lighter robot constructions using so...
EZR: Enhanced Zone Based Routing In Manet
Proposed system makes use of both proactive and reactive mechanisms. The core idea behind the topic deals with an efficient routing mechanism in MANET. It uses a hybrid scheme that combines the advantages of both p...
Efficient Implementation of Low Power 2-D DCT Architecture
This Research paper includes designing a area efficient and low error Discrete Cosine Transform. This area efficient and low error DCT is obtained by using shifters and adders in place of multipliers. The main tech...
High Heat Flux Micro-Electronics Cooling
Abstract: The temperature of an electronics device rises fairly linearly with increasing device heat flux. This relationship is especially problematic for defense electronics, where heat dissipation is projected to...
Image Enhancement Using Guided Image Filter and Wavelet Based Edge Detection
- This paper proposes a new method for image enhancement by incorporating the concept of guided image filter and wavelet based edge detection. Guided image filter is a spatial domain filter performs the filter...