An efficient approach for secured communication in wireless sensor networks (original) (raw)

A Novel Authentication approach in Wireless sensor Network

International Journal of Scientific and Engineering Research, 2014

WSN consists of large number of Sensor Nodes where each Sensor Nodes in the network are connected by a wireless channels. The node will sense the environmental data and sends to the other sensor nodes or Base Station. During the transmission of data from one node to another node, different security techniques are used. To implement security, such as confidentiality, integrity and authentication, keys are needed. Key Management is important for implementing security in a wireless Sensor Network. Wireless Sensor Networks are believed to be the enabling technology for ambient intelligence. The common attacks that can be made on WSN are attacks like eavesdropping, man-in-the middle attack and passive attacks like replay attacks, DoS attacks, and cloning attacks. An authentication protocol can enable the senders to confirm that the packet was truly sent to authentic receiver. Our solution achieves proper authentication while keeping energy consumption at minimum. A separate key for each node to node communication is generated so that detection of malicious node is easily possible.The use of timestamping provides additional security.

Survey on Message Authentication and Source Privacy in Wireless Sensor Networks

Message authentication is one of the most efficient ways to prevent unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). That's why, numerous message authentication proposals have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Many of them, however, have the restrictions of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. Wireless Sensor Networks (WSN) are being very popular day by day, however one of the main concern in WSN is its limited resources. One have to look to the resources to generate Message Authentication Code (MAC) keeping in mind the feasibility of method used for the sensor network at hand. This paper investigates different cryptographic approaches such as symmetric key cryptography and asymmetric key cryptography.

Authentication Protocol for Wireless Sensor Networks

World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, 2010

Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.

A Secure Authentication mechanism for Wireless Sensor Networks

— Today, wireless sensor networks are widely used due to the emergence of the Internet of Things. These networks communicate in exposed environments and as such they are susceptible to easy interception by attackers. Additionally, by its very nature, the Wireless Sensor Network environment is limited in its capacity to handle potentially sensitive information due to light security system. To provide secure and efficient mechanism, we proposed a secure authentication model in which adversary could not affect the network and genuine nodes freely communicate with each others. The proposed model introduce secure authentication through which even attacker knows the private key they could not communicate with authorized parties continuously.

Secure and Authenticated Data Communication in Wireless Sensor Networks

Sensors, 2015

Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes.

Efficient Message Authentication and Source Privacy in Wireless Sensor Networks

Abstract: Message authentication is used to prevent the unauthorized messages forwarded in the Wireless Sensor Networks (WNS). The main aim of this project is to prevent unauthorized and corrupted message by allowing intermediate efficient node authentication. Many authentication schemes have been proposed to provide message authenticity; these schemes can be either public-key based approaches or symmetric-key based approaches. Scalable authentication scheme based on Elliptic Curve Cryptography (ECC) enables the intermediate node to authenticate the message and provide Hop by Hop message authentication. Route request is encrypted for authentication of messages with source privacy. An efficient key management framework is proposed to ensure isolation of the compromised node. The compromised node will be identified and alert information sends to all nodes. Keywords: Wireless Sensor networks, Message authentication, Source privacy, Symmetric key cryptosystem, compromised node. Title: Efficient Message Authentication and Source Privacy in Wireless Sensor Networks Author: A. Arul packiaraj, M. Merlin Moses International Journal of Computer Science and Information Technology Research ISSN 2348-1196 (print), ISSN 2348-120X (online) Research Publish Journals

Authenticating messages in wireless sensor networks

2017 International Conference on Trends in Electronics and Informatics (ICEI), 2017

Unethical and illegal messages can be easily obstructed by suitably authenticating them; in wireless sensor networks (WSNs), it is imperative that such messages should not be redirected. WSNs are trivial, low rate, and low battery-operated nodes wherein interconnection among nodes occurs via wireless links in a location that is extremely harsh and limited with few resources. It has been observed that WSNs are mainly used in unsupervised locations; so, they are highly susceptible to stalkers. To overcome such problems, there have been various authentication methods that have been initiated that are based on symmetric and public key cryptography. Message authentication is one such method that decreases illegal attacks in WSNs. Nonetheless, the method suffers from problems like large computational operating cost, lack of flexibility to node attacks, and scalability. Therefore, to surmount these problems, we develop a system that is based on modified elliptic curve digital signature. We...

SECURING INFORMATION IN WIRELESS SENSOR NETWORKS

Security in Wireless sensor Network has emerged a must required research topic for the researchers. Securing the important data without affecting its accuracy is a important task. In this paper some of the important and feasible security techniques are discussed. Some of the standard and popular encryption techniques are Digital Encryption Systems (DES) and Advanced Encryption systems (AES). Attacks considered in the WSN environment are more, some of the main type like active attacks and passive attacks. Here, attacks in WSN are discussed in details and avoidance of those attacks using encryption techniques are also discussed here. This paper also analyzes the performance of DES and AES algorithms against the attacks in WSN.

Security in Wireless Sensor Networks communication protocols: challenges and solutions

Wireless Sensors Network (WSN) are a promising platform for emerging technologies like Internet of Things (IOT), energy optimisation, smart grid, vehicular sensor networks, cloud computing, water monitoring and many others [1]. Generally, sensors have limited resources in terms of energy and of treatment capacities. Despite the indicated limitation, WSN has to permit resolution of many complexes problems concerning Quality of Service (QoS), security, reliability and scalability. Today, WSN is vulnerable to security threats like conventional networks and presents many specific problems to provide security to new generation of internet services such as delay sensitive applications [2] … Providing security over WSN is much more challenging compared with security over wired networks. It is due to sensors mobility, links state and dynamic topology. In the present paper, we discuss the security objectives and requirements. We present some technics proposed in recent years to ensure security in WSN environment.

Framework for Secure Wireless Communication in Wireless Sensor Networks

International Journal of Distributed Sensor Networks, 2013

With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. WSNs have many fields of applications that are playing an essential role in increasing productivity and reducing cost. The restricted and constrained nature of sensors along with potentially dynamic behavior of WSNs demands the proper implementation of framework for secure communication in order to prevent attacker from illegally accessing or altering the transmission. We proposed a framework for secure wireless communication in WSNs which consists of four modules, that is, redundancy checker, message prioritization mechanism, malicious node verification, and malicious data verification. Detailed results of security and performance analysis have been realized for comparison and evaluation with complete implementation using NS2 network simulator. The proposed framework presents numerous interesting features which proofs accep...