Compromised nodes in wireless sensor network 1
|
|
- Rhoda Murphy
- 5 years ago
- Views:
Transcription
1 Compromised nodes in wireless sensor network 1 Lin Zhi-Ting, Qu Yu-Gui, Li Jing, Zhao Bao-Hua MOE-Microsoft Key Laboratory of Multimedia Computing and Communication, Department of Electronic Engineering and Information Science, University of Science and Technology of China Hefei, Anhui , China +Corresponding author: Phn , Fax duanmanni@ustc.edu Abstract. Sensor webs consisting of nodes with limited battery power and wireless communication are deployed to collect useful information from a variety of environments. A new challenge in the wireless sensor networks (WSN) is the compromised nodes problem. Compromised nodes may exhibit arbitrary behavior and may collude with other compromised nodes. In this paper, we propose a novel security strategy with assistant cluster heads, SSACH, which focuses on limiting the attack from compromised nodes. It adds the Assistant Cluster Heads (ACH) so as to monitor Cluster Head (CH) and take precautions against the inside attack. 1 Introduction Sensor networks offer economically practicable solutions for many applications. For instance, current implementations include monitoring factory instrumentation, pollution levels, freeway traffic, and the structural integrity of buildings [1].The privacy and security issues posed by sensor networks represent a rich field of research problems [2]. Sensor nodes are susceptible to physical capture [3]. And as a consequence of their targeted low cost, tamper-resistant hardware is unlikely to prevail. So, when designing a secure sensor network we should assume that the nodes within it may be compromised by an attacker. If a node is compromised, all the information it holds will also be leaked out. With nodes compromised, an adversary can carry out an inside attack. In contrast to disabled nodes, compromised nodes actively seek to paralyze the network [4]. Furthermore, wireless sensor network often utilizes message aggregation to reduce communication overhead. But message aggregation makes security more difficult. Each intermediate node can modify, forge or discard messages, or simply transmit false aggregation values, so one compromised node is able to significantly alter the final aggregation value [5][6]. In this paper, we propose a novel framework for secure information aggregation in large sensor networks. Security Strategy with Assistant Cluster Head focuses on limiting the attack from compromised node. SSACH adds the Assistant Cluster Heads so as to monitor Cluster Head and take precautions against the inside attack. ACH utilizes the proportionate sampling to testify that the answer given by the CH is a good approximation of the true value. SSACH will be shown to exhibit excellent performance via simulations. The remainder of this paper is organized as follows. Section 2 presents our strategy in detail. In Section 3, we examine the performance of our scheme, and finally draw a conclusion from our work in Section 4. 2 SSACH Description 2.1 Key Distribute Mechanism of SSACH Pre-distribution of secret keys are adopted in SSACH. Table 1 displays the notation used in the scheme descriptions. 1 This paper is supported by the National Natural Science Foundation of China under Grant No ,the National Grand Fundamental Research 973 Program of China under Grant No. 2003CB314801, and the State Key Laboratory of Networking and Switching Technology.
2 Table 1. Notation used in SSACH Notation Description S i Sensor node i F m (i,j) Key generating function shared between sensor nodes i and j ω The number of the symmetric matrices nonce Random nonce value E(K, Symmetric encryption function using key K α The challenge code Id i Identifier for node i Concatenation operator There are M key generating functions in the entire network. Each node stores a key, K i, shared with the base station, and a subset of the key generating functions F m (i,x) [7] [8], m M. Nodes Si and S j sharing the same key generating function F m, can calculate the shared key F m (i,j)=f m (j,i) [9][10]. The other nodes S p, p i, j, are unable to calculate Fm(i,j). For example, we could construct a ( λ + 1) * N matrix G over a finite field GF(q) and ω symmetric matrices D 1, D 2,..., D ω of size ( λ + 1)*( λ + 1). Because D n (1 n ω ), is symmetric, it is easy to see: A n * G = (D n * G) T * G = G T * D n T * G = G T * D n * G= (A n * G) T (1) Let A n (j) represent the jth row of A n. Then the base station could randomly select t distinct key spaces from the key spaces (A(j)) for each node. Up to now, F m (i,j) can be calculate in the following manner: F m (i,j) =A n (i)* G(j) = A n (j)* G(i)= F m (j,i) (2) Despite the fact that some nodes may compromise, they have limited effects on the security of the network. SSACH uses the challenge-response technique to evade the smart attack [11]. Smart attack means the attacker attempts to compromises the sensor that stores the largest number of keys which are not known. { α, E ( α ), m M} (3) Fm (, i j) The decryption with the proper key by sensor s b would reveal the challenge α and the information that s b shares that particular key with sensor s a. So far, the nodes succeed in obtaining the following keys: Key shared with the base station: K i Key shared with the Cluster Head: K i,ch =F m (i,ch) Key shared with the Assistant Cluster Head: K i,ach =F m (i,ach) Key shared with the neighbors nodes: K i, neighbour =F m (i, neighbour) 2.2 Data Transmission and Compression Based on SSACH As Fig. 1 shows, the wireless sensor network employs the hierarchical clustering model. Cluster Head and Assistant Cluster Head are selected in turn from nodes within cluster. Gathered data are encrypted and transmitted to the CH and ACHs separately. Fig. 1. Structure of wireless sensor network After collecting results from a group of sensors, the CH calculates a smaller message, id CH E(K CH,ACH,,nounce id CH Aggregation_message), which summarizes the important information
3 and transmits the result to ACHs. Then ACHs validate the compressive message making use of the data collected from certain sensor nodes. If accurate, the ACHs construct an agreement encrypted with the key K ACH, and pass id ACH MAC(K ACH,,nounce id ACH Aggregation_message) on to CH. On the contrary, an alarm would be sent out. The cluster head wouldn t convey the aggregation data to the base station in a relay way, until it has collected adequate agreements. The aggregation datum is denoted as: Report : id CH E(K CH,nounce id CH Aggregation_message XMAC ACH_list) where, XMAX= MAC(K ACH1,,nounce id ACH1 Aggregation_message) MAC(K ACH2,,nounce id ACH2 Aggregation_message) MAC(K ACHk,,nounc id ACHk Aggregation_message) If the CH is compromised, and it simply ignores the advice of the ACHs and sends compromised data without enough agreements. The base station would also send out an alarm unhesitatingly. At the same time, the relaying nodes between CH and BS should calculate and store data summary. If a certain relaying node compromises, it may inject wrong message into the sensor network or discard message on purpose. As a result, follow-up nodes must turn into different summaries or have no summary. If the base station receives incorrect information, it can broadcast alarm and collect the summaries in order to isolate the suspicious nodes. (4) Fig. 2. Message Aggregation The process of data transmission and compression based on SSACH is shown in Fig.2. Obviously, a distinguishing feature of SSACH is that ACHs and data summaries are added to supervise the behavior of CH and the relaying nodes. SSACH can take precautions against CH launching the inside attack, and provide an effective method of confining the compromised relaying node. The algorithm is rendered useless if the CH and all ACH nodes are compromised. It is stated that the election algorithm must be designed very carefully. The same set of sensor node should not always act as the CH or the ACHs. For instance, sensor nodes can queue up to be header according to their IDs. Here, it is supposed that there are n nodes compromised in certain cluster which is made up of m sensor nodes. So the probability that the compromised node becomes the cluster head is: P=n/m, which means that n/m of the data may be invalid. SSACH adds k associate cluster head. So the probability of compromised node occupying the CH and all the ACHs turns into: k + 1 P Cn n!( m k 1)! (5) = = C k + 1 m!( n k 1)! m It points out the amount of invalid data would be much less, whereas such technique will cause the increasing of communication quantity. Keeping in mind that communication between nodes consumes a significant amount of the energy resources, applications and system software are expected to achieve a required level of performance while minimizing the amount of traffic in the network [12]. Therefore, SSACH utilizes the proportionate sampling to reduce energy consumption. The wireless sensor network is divided into k groups. An ACH selects one group of the sensor nodes at random, and the nodes being selected are required to send data of low precision to the ACH. For instance raw data (10bit) are collected by CH, and low precision data (4bit) are gathered by ACH. Subsequently, it will reduce the total of communication. However, error must be brought into while making use of sampling.
4 If the high precision samples are used, mean error of the average of the samples is as follows, where the σ is the total standard deviation. 2 2 σ m m/ k σ ( k 1) μx = ( ) = m/ k m 1 m 1 And in the case that low precision samples are adopted, the formula shows the lower bound of the mean error. (6) 3 Simulation Experiments And Analysis In this section, we simulated the SSACH described in Section 2. First, we considered a sensor cluster made up of 100 nodes has 1~3 ACHs and 5~30 compromised nodes. The probability of the valid transmission is as follows Fig.3. It exemplifies that SSACH is able to restrict attack from inside effectively. When the quantity of ACHs is large enough, the data can almost convey correctly. Data transitions are nearly free of the impact of the compromised node. Fig. 3. Performance of resisting compromised node In order to test the performance of SSACH from different points of view, the error caused by sampling was taken into account. We consider a sensor cluster made up of 200 nodes contains 1~5 ACHs. And the raw data range between [0.0, 100.0]. The results plotted in Figure 4 show that if the data bit is reduced properly, the mean error of the average of the sample can be acceptable. Fig. 4. Mean error of the average of the sample Simulations above illustrate that SSACH is efficient with respect to the security it provides and allows a tradeoff between security and performance.
5 4 Conclusions Wireless sensor networks are often deployed in unattended environments. Node compromise is the central problem that uniquely characterizes the sensor network s threat model. So, in this paper a straightforward but effective scheme, SSACH, is presented. SSACH focuses on secure information aggregation in sensor networks that can handle a malicious CH and malevolent sensor nodes. SSACH has been demonstrated to exhibit excellent performance. References 1. Haowen Chan, Perrig, A.: Security and Privacy in Sensor Networks. Computer Vol.36, Issue 10. (2003) Sencun Zhu, Setia, S, Jajodia, S, Peng Ning: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Security and Privacy 2004, Proceedings, 2004 IEEE Symposium. (2004) Shi, E.; Perrig, A.: Designing secure sensor networks. Wireless Communications, IEEE. Vol.11, Issue 6, (2004) Qingchun Ren, Qilian Liang: Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures. Personal, Indoor and Mobile Radio Communications, PIMRC th IEEE International Symposium, Vol.4 (2004) Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: Secure Aggregation for Wireless Networks. Enabling Technologies. Infrastructure for Collaborative Enterprises, WET ICE Proceedings. Eleventh IEEE International Workshops. (2002) B. Przydatek, D. Song, and A. Perrig,: SIA: Secure Information Aggregation in Sensor Networks. Proc. of Embedded Networked Sensor Sys (2003) R. Blom.: An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology, EUROCRYPT 84, LNCS 209. (1984) C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung.: Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology CRYPTO 92, LNCS 740 (1993) D. Liu and P. Ning.: Establishing Pairwise Keys in Distributed Sensor Networks. In Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 03) (2003). 10. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. Proceedings of the 10th ACM conference on Computer and communications security (2003) Di Pietro, R., Mancini, L.V., Mei, A.:Efficient and resilient key discovery based on pseudo-random key pre-deployment. Parallel and Distributed Processing Symposium 2004 Proceedings (2004) Slijepcevic S., Potkonjak M., Tsiatsis V., Zimbeck S., Srivastava M.B.: On communication security in wireless ad-hoc sensor networks. Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE Proceedings. Eleventh IEEE International Workshops (2002)
Key establishment in sensor networks
Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks
More informationKey establishment in sensor networks
Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;
More informationBy: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili W. Du, J. Deng, Y. S. Han, P. K. Varshney,
More informationUse of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks
Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable
More informationEnhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *
Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * SCOE, Pune University Prof. J. B. Kulkarni SCOE, Pune University Abstract Security is the main issue while setting
More informationAn Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu 1 Sanjeev Setia 1 Sushil Jajodia 1,2 1 Center for Secure Information Systems George Mason
More informationDynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks
Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide
More informationEnergy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication
Vol. 9, No. 12, 218 Energy-Efficient Security Threshold Determination Method for the Enhancement of Interleaved Hop-By-Hop Authentication Ye Lim Kang 1, Tae Ho Cho *2 Department of Electrical and Computer
More informationSource Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,
More informationTDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1
, pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security
More informationA Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks
Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 2 A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks Wenliang Kevin
More informationA Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks WENLIANG DU Syracuse University JING DENG University of New Orleans YUNGHSIANG S. HAN National Taipei University, Taiwan PRAMOD K. VARSHNEY
More informationChord-based Key Establishment Schemes for Sensor Networks
Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because
More informationSecure Data Collection for Wireless Sensor Networks
Secure Data Collection for Wireless Sensor Networks Haengrae Cho 1 and Soo-Young Suck 2 1 Department of Computer Engineering, Yeungnam University, Republic of Korea 2 Department of R&D, Gyeongbuk Institute
More informationA Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks
A Set-Covering Approach for Modeling Attacks on Key redistribution in Wireless Sensor Networks atrick Tague Network Security Lab NSL) Dept. of Electrical Engineering University of Washington Seattle, Washington,
More informationCSC 774 Advanced Network Security
CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security Dr. Peng Ning CSC 774 Adv. Net. Security 1 Wireless Sensor Networks 1. Network protocol (e.g., routing) 2. Data management (e.g.,
More informationSELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,
More informationA Time-Based Key Management Protocol for Wireless Sensor Networks
A Time-Based Key Management Protocol for Wireless Sensor Networks Jiyong Jang 1, Taekyoung Kwon 2, and Jooseok Song 1 1 Department of Computer Science, Yonsei University {souljang, jssong}@emerald.yonsei.ac.kr.
More informationReliable Broadcast Message Authentication in Wireless Sensor Networks
Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric
More informationImproved Resilience against False Data Injection Attacks using PCRE Filtering Scheme
Improved Resilience against False Data Injection Attacks using PCRE Filtering Scheme J. Mamsa A. Kalaiarasi Mrs. S. Kalpana Devi Dept. of CSE Dept. of CSE Dept. of CSE Abstract - Cyber physical system
More informationCode Verification Work of Sybil Attack in Wireless Sensor Network
Code Verification Work of Sybil Attack in Wireless Sensor Network Gayatri Devi 1, Rajeeb Sankar Bal 2, Shubhashree Tripathy 3 1 Professor, Department of CSE, Ajay Binay Institute of Technology, Cuttack,
More informationA Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks WENLIANG DU and JING DENG Syracuse University YUNGHSIANG S. HAN National Chi Nan University, Taiwan PRAMOD K. VARSHNEY Syracuse University
More informationAbstract. 1. Introduction
SOOAWSN: A complete framework for Wireless Sensor Networks Graduate Student Paper Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela,
More informationUnpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin, Rodrigo Jose Salmeron, Pasd Putthapipat, Niki Pissinou, Deng Pan, Jeffrey Fan Florida International
More informationA Security Infrastructure for Trusted Devices
Infrastructure () A Security Infrastructure for Trusted Devices Mahalingam Ramkumar Mississippi State University, MS Nasir Memon Polytechnic University, Brooklyn, NY January 31, 2005 Infrastructure ()
More informationEfficient and Sustainable Self-healing Protocols for Unattended Wireless Sensor Networks
Efficient and Sustainable Self-healing Protocols for Unattended Wireless Sensor Networks Juan Chen 1, Hongli Zhang 1, Binxing Fang 1,3, Xiaojiang Du 2, Haining Yu 1, Xiangzhan Yu 1 1 Research Center of
More informationA General Probabilistic Model for Improving Key Assignment in Wireless Networks
A General Probabilistic Model for Improving Key Assignment in Wireless etworks Patrick Tague and Radha Poovendran etwork Security Lab (SL, Department of Electrical Engineering University of Washington,
More informationMODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS
Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014
Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,
More informationComputer Communications
Computer Communications 34 (2011) 591 597 Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom Energy-efficient and high-accuracy secure data
More informationRe-examining Probabilistic Versus Deterministic Key Management
Re-examining Probabilistic Versus Deterministic Key Management Dahai Xu Jianwei Huang Jeffrey Dwosin Mung Chiang Ruby Lee {dahaixu, jianweih, jdwosin, chiangm, rblee}@princeton.edu Department of Electrical
More informationESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS
ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer
More informationA Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *
Wireless Sensor Network, 2013, 5, 33-40 http://dx.doi.org/10.4236/wsn.2013.53005 Published Online March 2013 (http://www.scirp.org/journal/wsn) A Secure Routing Method for Detecting False Reports and Wormhole
More informationA Group-oriented Access Control Scheme for P2P Networks 1
I.J. Wireless and Microwave Technologies, 2011, 1, 30-37 Published Online February 2011 in MECS (http://www.mecs-press.net DOI: 10.5815/ijwmt.2011.01.05 Available online at http://www.mecs-press.net/ijwmt
More informationDETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS
DETECTION OF NODE CAPTURE ATTACKS IN WIRELESS SENSOR NETWORKS S.Pavaimalar *, G.ShenbagaMoorthy ** * II-M.E, Department of CSE, A.S.L. Pauls College of Engineering and Technology, Coimbatore, India. **
More informationRandom Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
ISSN (e): 2250 3005 Vol, 05 Issue, 01 January 2015 International Journal of Computational Engineering Research (IJCER) Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks Si-Gwan
More informationLIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2
More informationA Scalable Key Agreement Scheme For Large Scale Networks
A Scalable Key Agreement Scheme For Large Scale Networs Yun Zhou, Student Member, IEEE, and Yuguang Fang, Senior Member, IEEE Abstract Key agreement is a central problem to build up secure infrastructures
More informationCMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks
CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks Prathap U, Deepa Shenoy P and Venugopal K R Department of Computer Science and Engineering University Visvesvaraya College
More informationOn Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks
On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless
More informationAttack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks Firdous Kausar 1, Sajid Hussain 2,Tai-hoonKim 3, and Ashraf Masood 1 1 College of Signals, NUST, Rawalpindi, Pakistan firdous.imam@gmail.com,
More informationDETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM
DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department
More informationForward-secure Key Evolution in Wireless Sensor Networks
Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski 1 Mirosław Kutyłowski 1 Michał Ren 2 Katarzyna Rybarczyk 2 1 Wrocław University of Technology Wrocław, Poland 2 Adam Mickiewicz
More informationENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME
ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,
More informationSungkyunkwan University, Suwon 16419, Republic of Korea 2 College of Software Sungkyunkwan University Suwon 16419, Republic of Korea
Kalpa Publications in Computing Volume 2, 2017, Pages 196 204 ICRISET2017. International Conference on Research and Innovations in Science, Engineering &Technology. Selected Papers in Computing Modeling
More informationA Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks
A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks Mandicou Ba, Ibrahima Niang, Bamba Gueye Département de Mathématiques et Informatique Université Cheikh Anta Diop Dakar,
More informationA Survey on Message Authentication Schemes in Wireless Sensor Networks
A Survey on Message Authentication Schemes in Wireless Sensor Networks Mahindra Kubsad, Prabodh C P Abstract These instructions give you guidelines for Abstract Message validation is a standout amongst
More informationSowing Seeds Protocol based Key Distribution for Wireless Sensor Network
Sowing Seeds Protocol based Key Distribution for Wireless Sensor Network Saif Al-Alak Department of Computer Science, College of Science for Women, University of Babylon, Iraq. Abstract Wireless Sensor
More informationCONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSecurity of Aggregated Data in Wireless Sensor Network
Security of Aggregated Data in Wireless Sensor Network Surabhi Singhal Abstract A Wireless Sensor Network can be defined as a group of sensors which are distributed spatially to monitor physical or spatial
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationA NOVEL APPROACH FOR DETECTING COMPROMISED NODES IN WIRELESS SENSOR NETWORKS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 15-19 A NOVEL APPROACH FOR DETECTING COMPROMISED NODES IN WIRELESS SENSOR NETWORKS P. Vijayalakshmi 1, D. Somasundareswari
More informationSelective Forwarding Attacks Detection in WSNs
Selective Forwarding Attacks Detection in WSNs Naser M. Alajmi and Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA nalajmi@my.bridgeport.edu,
More informationA Secure Message Percolation Scheme for Wireless Sensor Network
A Secure Message Percolation Scheme for Wireless Sensor Network Md. Abdul Hamid 1 and Choong Seon Hong 1 1 Networking Lab, Department of Computer Engineering, Kyung Hee University 1 Seocheon, Giheung,
More informationImpact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing
More informationContending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks
Contending Against Energy Debilitating Attacks in Wireless Ad Hoc Sensor Networks Vidya.M Department of Computer Science and Engineering, Atria Institute of Technology, Bangalore, India Vidya.M1389@gmail.com
More informationAn Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks Oscar Delgado-Mohatar 1,José M. Sierra 2, Ljiljana Brankovic 3, and Amparo Fúster-Sabater 1 1 Instituto
More informationProviding Transparent Security Services to Sensor Networks
1 Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou Athens Information Technology Email: {hsor,msal,tdim}@ait.edu.gr Abstract In this paper
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More informationGP 2 S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data
GP 2 S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data Wensheng Zhang, Chuang Wang and Taiming Feng Department of Computer Science, Iowa State University, IA 50011 Email:
More informationSecure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks University of Cambridge Computer Laboratory 22nd IFIP TC-11 International Information Security Conference Sandton,
More informationKey Management for Static Wireless Sensor Networks With Node Adding
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 2, MAY 2014 1133 Key Management for Static Wireless Sensor Networks With Node Adding Filippo Gandino, Member, IEEE, Bartolomeo Montrucchio, Member,
More informationMs A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.
Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics
More informationSecurity of Mobile Ad Hoc and Wireless Sensor Networks
Security of Mobile Ad Hoc and Wireless Sensor Networks July, 2013 Edward Bonver LA Board Member Symantec Corporation edward@owasp.org Copyright The Foundation Permission is granted to copy, distribute
More informationStudy on Dynamic Key Management of Clustered Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.6, June 006 45 Study on Dynamic Key Management of Clustered Sensor Networks Huanzhao Wang, Dongwei Luo, Feifei Chen and Zengzhi
More informationConnected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu
More informationA Self-healing Key Distribution Scheme with Novel Properties
International Journal of Network Security, Vol7, No1, PP114 119, July 2008 114 A Self-healing Key Distribution Scheme with Novel Properties Biming Tian and Mingxing He (Corresponding author: Biming Tian)
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationKey Grids: A Protocol Family for Assigning Symmetric Keys
Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed
More informationREPUTATION BASED ZONE TRUST DETECTION AND SWATT REVOCATION METHOD USING SPRT IN SENSOR NETWORKS
REPUTATION BASED ZONE TRUST DETECTION AND SWATT REVOCATION METHOD USING SPRT IN SENSOR NETWORKS Rakshith Upparige K R 1, Sateesh Kumar H C 2 PG Scholar, Department of Telecommunication Engineering, Dayananda
More informationStrongly Anonymous Communications in Mobile Ad Hoc Networks
Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationPrivacy Preserving Collaborative Filtering
Privacy Preserving Collaborative Filtering Emily Mu, Christopher Shao, Vivek Miglani May 2017 1 Abstract As machine learning and data mining techniques continue to grow in popularity, it has become ever
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationChongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.
2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data
More information2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes
2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or
More informationALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--
More informationThe Best Keying Protocol for Sensor Networks
The Best Keying Protocol for Sensor Networks Taehwan Choi Department of Computer Science The University of Texas at Austin Email: ctlight@cs.utexas.edu H. B. Acharya Department of Computer Science The
More informationAn Analytical study on Key Pre-distribution in Wireless Sensor Networks.
An Analytical study on Key Pre-distribution in Wireless Sensor Networks. M.Rajasekhar M.Tech, Student, Computer Science Engineering Department, Rao & Naidu Engineering College, Ongole. Abstract: A wireless
More informationResearch on Transmission Based on Collaboration Coding in WSNs
Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information
More informationDetection of Node Clone in Wireless Sensor Networks
Detection of Node Clone in Wireless Sensor Networks Amaresh Chavali P.G. Scholar, Dept. of CSE, Narasaraopet Engineering College, Narasaraopet. Abstract: Wireless sensor networks are vulnerable to the
More informationA Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks
5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile
More informationSecure cell relay routing protocol for sensor networks
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2006; 6:375 391 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/wcm.402 Secure cell relay routing
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationAN EFFICIENT DETECTION AND PREVENTION OF DDoS ATTACK IN WSN
AN EFFICIENT DETECTION AND PREVENTION OF DDoS ATTACK IN WSN R.Vijayarajeswari #1, S.Priya *2 #1 Vivekanandha college of technology for women *2 Vivekanandha college of technology for women Abstract--In
More informationSpoofing Attacks in wireless Sensor Networks
Spoofing Attacks in wireless Sensor Networks V Bharath Srinivas, Dr Syed Umar Department of ECM, KL University, A.P., INDIA. Abstract Wireless networks are vulnerable to spoofing attacks, which allows
More informationA Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks
International Journal of Network Security, Vol.15, No.6, PP.490 500, Nov. 2013 490 A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks Neeraj Kumar 1, Manoj Kumar 1,
More informationA Modified LEACH Protocol for Increasing Lifetime of the Wireless Sensor Network
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 3 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0040 A Modified LEACH Protocol for
More informationA METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication
More informationAmeliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating
More informationSecure Routing and Transmission Protocols for Ad Hoc Networks
MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks
More informationAn Online Threshold Key Distribution Scheme for Symmetric Key Management
An Online Threshold Key Distribution Scheme for Symmetric Key Management Alireza T. Boloorchi, M. H. Samadzadeh, and T. Chen Computer Science Department, Oklahoma State University Stillwater, OK, USA Abstract
More informationWIRELESS sensor networks (WSNs) have been
IEEE SENSORS JOURNAL, VOL. 15, NO. 9, SEPTEMBER 2015 5103 Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks Lein Harn and Ching-Fang Hsu Abstract Special designs are needed
More informationInternational Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:
Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationAn Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
IEEE International Conference on Wireless & Mobile Computing, Networking & Communication An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs Christoph Krauß, Markus Schneider,
More informationCoded Cooperative Data Exchange for Multiple Unicasts
Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:
More informationAn Efficient Key Management Scheme for Heterogeneous Sensor Networks
An Efficient Key Management Scheme for Heterogeneous Sensor Networks S.Gandhi,D.Indira Department of Computer Science and Engineering Gudlavalleru Engineering College Gudlavalleru 521356 Abstract Previous
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More information