Ensuring basic security and preventing replay attack in a query processing application domain in WSN

A Ghosal, S Halder, S Sur, A Dan, S DasBit - Computational Science and …, 2010 - Springer
Computational Science and Its Applications–ICCSA 2010: International …, 2010Springer
Nodes in a wireless sensor network are susceptible to various attacks primarily due to their
nature of deployment. Therefore, providing security to the network becomes a big challenge.
We propose a scheme considering cluster architecture based on LEACH protocol to build a
security mechanism in a query-processing paradigm within wireless sensor network. The
scheme is capable of thwarting replay attack while ensuring essential properties of security
such as authentication, data integrity and data freshness. Our scheme is lightweight as it …
Abstract
Nodes in a wireless sensor network are susceptible to various attacks primarily due to their nature of deployment. Therefore, providing security to the network becomes a big challenge. We propose a scheme considering cluster architecture based on LEACH protocol to build a security mechanism in a query-processing paradigm within wireless sensor network. The scheme is capable of thwarting replay attack while ensuring essential properties of security such as authentication, data integrity and data freshness. Our scheme is lightweight as it employs symmetric key cryptography with very short-length key. We simulate our scheme to show its efficacy of providing basic security to the network as well as detecting replay attack in the sensor network. Further we compare our scheme with one of the existing schemes taking packet loss and packet rejection ratio as performance metrics.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果