Título: A PROFICIENT APPROACH TOWARDS WIRELESS SENSOR NETWORK SAFETY MODEL
Autores: Maheswari, K.Y.; M.Tech Student, Dept of CSE, RRS College of Engineering and Technology, Patancheru, Medak, A.P, India
Satchidanandam, A.; Assistant Professor, Dept of CSE, RRS College of Engineering and Technology, Patancheru, Medak, A.P, India
Fecha: 2013-06-02
Publicador: International journal of computer and electronics research
Fuente:
Tipo: Peer-reviewed Article
Tema: Wireless Sensor Networks; Physical Attacks; Proof Protected; Fingerprint; MITM Attack; Replay Attack; Cryptographic
Descripción: Advances in technology have made it feasible to expand sensor nodes which are compressed and economical. They are accumulated with a variety of sensors and are wireless facilitated. Once sensor nodes have been organized, there will be negligible manual interference and monitoring. It creates a security concern when nodes are organized in unfriendly environment and there is no manual monitoring. Nodes may be subjected to a variety of physical attacks. Wireless Sensor Networks (WSNs) offer an exceptional opportunity to monitor environments, and have a lot of remarkable applications, some of which are relatively responsive in nature and need full proof protected environment. As there is no user-controlling of each individual node the safety mechanisms used for wired networks cannot be directly used in sensor networks, wireless environment, and more importantly inadequate energy resources. Some of the special security threats and attacks in WSNs are addressed here. A scheme for detection of distributed sensor cloning attack and use of zero knowledge protocol (ZKP) for verifying the authenticity of the sender sensor nodes is proposed. By attaching a unique fingerprint to each node is addressed by the cloning attack which depends on the set of neighboring nodes and itself. The fingerprint is connected with each message a sensor node sends. In order to avoid man-in-the middle (MITM) attack and replay attack, the ZKP is used to ensure non communication of essential cryptographic information in the wireless network. A detailed analysis for various scenarios and also analyzes the performance and cryptographic strength presented in this paper.
Idioma: Inglés

Artículos similares:

A hybrid k-Mean-GRASP for partition based Clustering of two-dimensional data space as an application of p-median problem por Nadella, Sunil; Associate Professor,P.G. Dept of Computer Science, Ideal College of Arts & Sciences, Kakinada,M V S V, Kiranmai; Lecturer ,Department of CSE,University College of Engineering,JNTU Kakinada,Gugulotu, Narasimha; Department of CSE JNTUH College of Engineering, Nachupally, Kondagattu,Karimnagar
Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment por Saini, Swarnpreet SIngh; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Bagga, Ritu; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Singh, Devinder; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Jangwal, Tarun; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar
A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography por R, Thamaraiselvan; Assistant Professor Dept. of Computer Applications M.G.R.College Dr. MGR Nagar Hosur - 635109 TN, India,Saradha, A.; Professor and Head, Department of Computer Science and Engineering, Institute of Road and Transport Technology, Erode, TN, India
RSA Algorithm Implementation for Ciphering Medical Imaging por Ali, Samoud; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.,Adnen, Cherif; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.
A STUDY ON KNOWLEDGE ACQUISITION APPROACH FOR COMPOSITE AEROSPACE COMPONENT DESIGN por Sivaraman, G; Assistant Professor & HeadDept. of Computer ApplicationsM.G.R.CollegeDr. MGR NagarHosur - 635109TN
Corpus based Emotion Extraction to implement prosody feature in Speech Synthesis Systems por Chandak, Manoj B; DEPTT. OF COMPUTER SCIENCE AND ENGG S.R.K.N.E.C NAGPUR UNIVERSITY,Bhutekar, Swati
A NEW DATA HIDING METHOD USING PIXEL POSITION AND LOGICAL AND OPERATION por Saini, Ravi; C.M.R.A., GP Sanghi,Rohtak, Haryana,Yadav, Rajkumar; U.I.E.T, Maharshi Dayanand University, Rohtak
A New Focus on Distance Learning for Physically Impaired Students: A Multi-agent Oriented Approach por Pujari, Shiladitya; University Institute of Technology, Burdwan University,Mondal, Subrata
Productivity Inference with Dynamic Bayesian Models in Software Development Projects por Naman, Abou Bakar; Department of Comptuer Science & Information Technology Sarhad University,Lali, M.Ikram.; University of education Lahore, Attock campus
10