Preview

An Id-Based Multiple Authentication Scheme Against Attacks in Wireless Sensor Networks

Better Essays
Open Document
Open Document
2530 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An Id-Based Multiple Authentication Scheme Against Attacks in Wireless Sensor Networks
Proceedings of IEEE CCIS2012

AN ID-BASED MULTIPLE AUTHENTICATION SCHEME AGAINST ATTACKS IN WIRELESS SENSOR NETWORKS
Siwei Peng
Dept. of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China saul.perceive@gmail.com Abstract A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. Therefore, WSN is venerable to various attacks. Among these attacks, the id-based attack such as node replication attacks and Sybil attacks are the most threatening. Hence, the security in WSNs presents a critical challenge for identity and data authentication. Although there are some recent approaches, most are resources-costing or constrained to some specific systems. Thus, in this paper, we present a novel authentication scheme to prevent these attacks. This Id-based Multiple Authentication (IMA) scheme bases upon the joint identity authentication and steganography to present a secure mechanism for data aggregation in WSNs. Simulations against above-mentioned attacks applying this scheme is presented and consequently show that the scheme can successfully authenticate the sensory data with high confidentiality. Keywords: Id-based authentication scheme; Wireless sensor network; Security data authentication which protects the integrity and the freshness against replication attacks. Even though efforts have been put into enhancing the authentication scheme, they have some shortages or drawbacks dealing with the security or the efficiency. Data authentication based on message authentication code (MAC) is known as a conventional scheme. Generally, a sensor node will append a MAC to its sensory data or to an aggregate report as an endorsement. These MACs will then be checked by the intermediate nodes along the route to the sink. Although the simple MAC operation is suitable for the energy efficiency, the



References: [1] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. Networks 52 (12) 2292–2330 (2008). [2] Suat Ozdemir a, Yang Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks. 53, 2022–2037 (2009) [3] Wei Zhang, Yonghe Liu, Sajal K. Das, Pradip De, Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach, Pervasive and Mobile Computing. 4, 658–680 (2008) [4] S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 260–272 (2004) [5] Wen TaoZhu, Jianying Zhou, Robert H. Deng, Feng Bao, Detecting node replication attacks in wireless sensor networks: A survey, Computer Networks 53, 945–960 (2009) [6] A. Perrig, R. Szewczyk, D. Tygar, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wireless Networks J. (WINE) 2 (5), 521 –534 (2002). Figure 7 Threshold configuration against dos attacks In Figure 8, we assume the number of the node in a network is 20 network is 20 and each attack need one minute. Proceedings of IEEE CCIS2012

You May Also Find These Documents Helpful