A Security Framework for Replication Attacks in Wireless Sensor Networks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5
Abstract
Mobile sinks play a great role in many Wireless Sensor Network applications for efficient data accumulation, localized sensor reprogramming and for collecting data from various sensor nodes across the globe. However, in sensor networks that make use of the existing three tier security framework, elevates a new security challenge i.e an attacker can easily create a replicated node and can gain control of the data in the network. Although the three-tier security framework is more resilient to mobile sink replication attacks, it is weak against access point replication attacks. To reduce the damage caused by access node replication attack, strengthening the authentication mechanism between the sensors and access nodes is vital. For this purpose, the single polynomial pool is converted to a double polynomial pool for providing security over the existing system. Also, security is increased by separating the access points into two layers namely, access nodes-D and access nodes-I along with a more secure authentication mechanism called WHIRLPOOL that produces a 512 bit encrypted text using Miyaguchi-Preneel scheme of cipher text generation.Our proposed algorithm ensures the necessary security mechanism for Wireless Sensor Networks and also does not degrade the performance of quality of service.
Authors and Affiliations
T. Subramani, S. Varma, R. Kabileshwaran
Develop and Apply Water Quality Index to Evaluate Water Quality of Tigris and Euphrates Rivers in Iraq
This study is an attempt to develop Iraqi river water quality index (IRWQI) which can be applied to evaluate the general water quality of the main Iraqi' rivers (Tigris and Euphrates) in its entire stretch for publi...
Gully Erosion Control along NWORIE River in Owerri,Imo State-A Deterministic Model Approach
The study developed a model for gully erosion control. The model, helped to predict total soil loss per annum particularly in the catchment area of Nworie river. Other theoretical models were used to compare result...
Numerical Analysis of Fin Side Turbulent Flow for Round and Flat Tube Heat Exchangers
Numerical three dimensional simulation of turbulent flow in round and flat tube fin heat exchangers having two rows of staggered arrangement has been carried out to investigate fluid flow and heat transfer characte...
Computer: - A Communication Device
Computer system is able to communicate more effectively than face-to-face. Computer programs are very important because they transcend mere “data’’-they include procedures and processes for structuring and manipula...
Investigating Waste Water Treatment in a Closed Environment
This paper focuses on the investigation of the claim of ‘The Sound and Environmental Water and Effluent Recycling company’ that water can be completely purified if a population of at least 10 organisms per cubic ce...