A Security Framework for Replication Attacks in Wireless Sensor Networks

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5

Abstract

 Mobile sinks play a great role in many Wireless Sensor Network applications for efficient data accumulation, localized sensor reprogramming and for collecting data from various sensor nodes across the globe. However, in sensor networks that make use of the existing three tier security framework, elevates a new security challenge i.e an attacker can easily create a replicated node and can gain control of the data in the network. Although the three-tier security framework is more resilient to mobile sink replication attacks, it is weak against access point replication attacks. To reduce the damage caused by access node replication attack, strengthening the authentication mechanism between the sensors and access nodes is vital. For this purpose, the single polynomial pool is converted to a double polynomial pool for providing security over the existing system. Also, security is increased by separating the access points into two layers namely, access nodes-D and access nodes-I along with a more secure authentication mechanism called WHIRLPOOL that produces a 512 bit encrypted text using Miyaguchi-Preneel scheme of cipher text generation.Our proposed algorithm ensures the necessary security mechanism for Wireless Sensor Networks and also does not degrade the performance of quality of service.

Authors and Affiliations

T. Subramani, S. Varma, R. Kabileshwaran

Keywords

Related Articles

Review of crosstalk free Network

Multistage interconnection networks (MIN) are among the most efficient switching architectures for the number of switching Element (SE). Optical crosstalk in optical multistage interconnection network on the omega networ...

 On G#P-Continuous Maps In Topological Spaces

 Abstract: The aim of this paper is to introduce and study g#p-continuous maps. Basic characterizations and several properties concerning them are obtained.Further,g#p-irresolute map is also defined. Some of the pr...

 Implementation of Monitoring System for Cloud Computing

 : As the benefits of cloud computing have increased, its utilization has been higher, but it has caused overload problems for virtual server. This paper implements the monitoring dashboard of cloud computing in ord...

 Integration of Wired and Wireless Networks through a Personal Communication network (PCN)

 Abstract: The Personal Communication Network (PCN) is known as the personal communication services (PCS) and is the result of the evolution of a mobile phone system. The PCN aims to support the services provided by...

Feature Extraction from the Satellite Image Gray Color and Knowledge Discovery Using Association Rule Mining

Satellite take images of the Earth in selected spectral bands that are in both the visible and the infrared portions of the electromagnetic spectrum. Many Satellites provide three types of Satellite Images. These Ima...

Download PDF file
  • EP ID EP152001
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

T. Subramani, S. Varma, R. Kabileshwaran (2013).  A Security Framework for Replication Attacks in Wireless Sensor Networks. International Journal of Modern Engineering Research (IJMER), 3(5), 2908-2915. https://europub.co.uk/articles/-A-152001