Preview

An Id-Based Multiple Authentication Scheme Against Attacks in Wireless Sensor Networks

Better Essays
Open Document
Open Document
2530 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An Id-Based Multiple Authentication Scheme Against Attacks in Wireless Sensor Networks
Proceedings of IEEE CCIS2012

AN ID-BASED MULTIPLE AUTHENTICATION SCHEME AGAINST ATTACKS IN WIRELESS SENSOR NETWORKS
Siwei Peng
Dept. of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China saul.perceive@gmail.com Abstract A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. Therefore, WSN is venerable to various attacks. Among these attacks, the id-based attack such as node replication attacks and Sybil attacks are the most threatening. Hence, the security in WSNs presents a critical challenge for identity and data authentication. Although there are some recent approaches, most are resources-costing or constrained to some specific systems. Thus, in this paper, we present a novel authentication scheme to prevent these attacks. This Id-based Multiple Authentication (IMA) scheme bases upon the joint identity authentication and steganography to present a secure mechanism for data aggregation in WSNs. Simulations against above-mentioned attacks applying this scheme is presented and consequently show that the scheme can successfully authenticate the sensory data with high confidentiality. Keywords: Id-based authentication scheme; Wireless sensor network; Security data authentication which protects the integrity and the freshness against replication attacks. Even though efforts have been put into enhancing the authentication scheme, they have some shortages or drawbacks dealing with the security or the efficiency. Data authentication based on message authentication code (MAC) is known as a conventional scheme. Generally, a sensor node will append a MAC to its sensory data or to an aggregate report as an endorsement. These MACs will then be checked by the intermediate nodes along the route to the sink. Although the simple MAC operation is suitable for the energy efficiency, the



References: [1] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. Networks 52 (12) 2292–2330 (2008). [2] Suat Ozdemir a, Yang Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks. 53, 2022–2037 (2009) [3] Wei Zhang, Yonghe Liu, Sajal K. Das, Pradip De, Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach, Pervasive and Mobile Computing. 4, 658–680 (2008) [4] S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 260–272 (2004) [5] Wen TaoZhu, Jianying Zhou, Robert H. Deng, Feng Bao, Detecting node replication attacks in wireless sensor networks: A survey, Computer Networks 53, 945–960 (2009) [6] A. Perrig, R. Szewczyk, D. Tygar, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wireless Networks J. (WINE) 2 (5), 521 –534 (2002). Figure 7 Threshold configuration against dos attacks In Figure 8, we assume the number of the node in a network is 20 network is 20 and each attack need one minute. Proceedings of IEEE CCIS2012

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Step 1: Construct a network diagram for the project. (NOTE: EF for activity H should be 19)…

    • 552 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    (1 point) 6. The first attack demonstrated on the Nittany Corp. network in the lab video is this kind of attack.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Use the network diagram below and the additional information provided to answer the corresponding questions. [13 points]…

    • 668 Words
    • 20 Pages
    Satisfactory Essays
  • Satisfactory Essays

    PROJ 586 W4 Homework

    • 588 Words
    • 3 Pages

    Use the network diagram below and the additional information provided to answer the corresponding questions. [13 points]…

    • 588 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231-…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Pm 586 Week 4

    • 686 Words
    • 3 Pages

    Use the network diagram below and the additional information provided to answer the corresponding questions. [13 points]…

    • 686 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Critical Path

    • 1047 Words
    • 5 Pages

    As all the activities were processed exactly on schedule for the first 106 duration hours, the network diagram after the first 106 duration hours is as follow:…

    • 1047 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Cryptanalysis

    • 1790 Words
    • 8 Pages

    Cryptanalysis is the study of defeating the methods generated by cryptography. The aim is to find out some flaws in a cryptographic scheme. Cryptology is the combined study of both cryptography and cryptanalysis.…

    • 1790 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Mobile Malware

    • 1047 Words
    • 3 Pages

    References: La Polla, M., Martinelli, F., & Sgandurra, D. (2013a). A Survey on Security for Mobile Devices. IEEE Communications Surveys Tutorials, 15(1), 446–471. doi:10.1109/SURV.2012.013012.00028…

    • 1047 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    The Network Diagram

    • 540 Words
    • 3 Pages

    To determine timing of activities in the network diagram the following calculations were done for each node: Earliest Start-(ES), Earliest Finish-(EF), Latest Start-(LS) and Latest Finish-(LF).…

    • 540 Words
    • 3 Pages
    Satisfactory Essays