A Security Framework for Replication Attacks in Wireless Sensor Networks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5
Abstract
Mobile sinks play a great role in many Wireless Sensor Network applications for efficient data accumulation, localized sensor reprogramming and for collecting data from various sensor nodes across the globe. However, in sensor networks that make use of the existing three tier security framework, elevates a new security challenge i.e an attacker can easily create a replicated node and can gain control of the data in the network. Although the three-tier security framework is more resilient to mobile sink replication attacks, it is weak against access point replication attacks. To reduce the damage caused by access node replication attack, strengthening the authentication mechanism between the sensors and access nodes is vital. For this purpose, the single polynomial pool is converted to a double polynomial pool for providing security over the existing system. Also, security is increased by separating the access points into two layers namely, access nodes-D and access nodes-I along with a more secure authentication mechanism called WHIRLPOOL that produces a 512 bit encrypted text using Miyaguchi-Preneel scheme of cipher text generation.Our proposed algorithm ensures the necessary security mechanism for Wireless Sensor Networks and also does not degrade the performance of quality of service.
Authors and Affiliations
T. Subramani, S. Varma, R. Kabileshwaran
Multiexposure Image Fusion
Many applications such as robot navigation, defense, medical and remote sensing perform various processing tasks, which can be performed more easily when all objects in different images of the same scene are combined i...
Privacy Preserving On Continuous and Discrete Data Sets- A Novel Approach
Abstract: Privacy preservation is important for machine learning and data mining, but measures designed to protect private information often result in a trade-off: reduced utility of the training samples. This intr...
Acquisition of Long Pseudo Code in Dsss Signal
Rapid pseudo-code is widely used in spread spectrum communication system, because it has a large datarate and a strong anti-jamming property. But it brings us large of difficulty to acquire it as its long period. A...
Improving the Security of Cloud Computing using Trusted Computing Technology
Cloud Computing is a collection of computers and servers that are publicly accessible via Internet. It is a significantly new idea that influence the power of internet to process, store and share data from a network of...
Improving E-learning System using Ontology Web Language
In recent years, most of the conventional education are suitable for requirements of progress in educational development but they don’t able to cope up with the changes of learning demand in time, thus computer n...