A Security Framework for Replication Attacks in Wireless Sensor Networks

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5

Abstract

 Mobile sinks play a great role in many Wireless Sensor Network applications for efficient data accumulation, localized sensor reprogramming and for collecting data from various sensor nodes across the globe. However, in sensor networks that make use of the existing three tier security framework, elevates a new security challenge i.e an attacker can easily create a replicated node and can gain control of the data in the network. Although the three-tier security framework is more resilient to mobile sink replication attacks, it is weak against access point replication attacks. To reduce the damage caused by access node replication attack, strengthening the authentication mechanism between the sensors and access nodes is vital. For this purpose, the single polynomial pool is converted to a double polynomial pool for providing security over the existing system. Also, security is increased by separating the access points into two layers namely, access nodes-D and access nodes-I along with a more secure authentication mechanism called WHIRLPOOL that produces a 512 bit encrypted text using Miyaguchi-Preneel scheme of cipher text generation.Our proposed algorithm ensures the necessary security mechanism for Wireless Sensor Networks and also does not degrade the performance of quality of service.

Authors and Affiliations

T. Subramani, S. Varma, R. Kabileshwaran

Keywords

Related Articles

 Finite Element Analysis of Human RIB Cage

 This paper of finite element analysis of the rib cage model is applied to recognize stress distributions and to determine the rate of bone fractures(especially for pathologically changed bones). Also to determi...

 Quantum Inspired Evolutionary Technique for Optimization of End Milling Process

 In this paper an attempt is made to develop a new Quantum Inspired Evolutionary Technique (QIET) that is general, flexible and efficient in solving single objective constrained optimization problems. It generat...

Management operation system techniques (MOST) replaces PERT and CPM in construction scheduling

The Management Operation System Technique (MOST) invented in 1961, replaces PERT and CPM on construction projects and in program management. Since its inception, MOST has gained popularity and is now widely use...

 Design and Analysis of Vapour Absorbing Machine

 A vapor absorption machine (VAM) is a machine that produces chilled water using a waste heat source rather than electrical input as in the more familiar vapor compression cycle. Vapor absorption machine works on th...

 Influence of grain refiner addition and heat treatment on the mechanical properties of Al-Si alloy

 Abstract: In the present investigation, an attempt is made to study the effect of addition of grain refinement on Al-Si alloy, when it is subjected to the combined grain refiner addition (Al-5T-1B) and subjected to...

Download PDF file
  • EP ID EP152001
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

T. Subramani, S. Varma, R. Kabileshwaran (2013).  A Security Framework for Replication Attacks in Wireless Sensor Networks. International Journal of Modern Engineering Research (IJMER), 3(5), 2908-2915. https://europub.co.uk/articles/-A-152001