Improve security of wireless sensor networks through reluctant checksum

被引:5
|
作者
Zhang, Qiong [1 ]
Xiao, Jianyu [2 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Comp Sci & Technol, Xian 710121, Shaanxi, Peoples R China
[2] Cent S Univ, Sch Informat Sci & Engn, Changsha, Hunan, Peoples R China
关键词
Wireless sensor networks; security; cumulative checksum; open channel problem; PHYSICAL LAYER;
D O I
10.1177/1550147717731041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The open wireless channel makes the data prone to being eavesdropped. Current wireless security schemes are designed to protect data through cryptography. But an adversary can still recover the secrets by eavesdropping the frames and performing off-line brute-force attacks. Capturing valid frames is fundamental for such attacks. It is generally accepted that each frame at data link layer is designed to include cyclic redundancy check (CRC) checksum sequence for integrity check. However, frame checksum sequence also helps adversary to capture correct frames and drop corrupted ones, which are fundamental to future off-line attacks. In this article, we argue that from the perspective of wireless security, it is unreasonable to include checksum sequence in data link layer frame without any protection. A reluctant checksum scheme named R-CS is proposed. Based on the inherent characteristic of wireless networks that frame error is inevitable, checksum of frame is protected by accumulated checksum algorithm in R-CS. The checksum of the frame cannot be decoded by any nodes except the receiver. Without checksum, adversaries cannot distinguish error frames from correct ones. R-CS requires little computation and communication resources, which is particularly suitable for resource-limited wireless sensor network. Our experimental results clearly demonstrate that R-CS is feasible for wireless sensor network.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
    Zhang, Qiong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07):
  • [2] Strengthen security of Wireless Sensor Networks through Sensor Diversity
    Zhang Kewang
    Zahng Qiong
    IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, : 1033 - 1038
  • [3] Improve the security over the wireless sensor networks in medical sector
    Alsumayt, Albandari
    Albawardy, Norah
    Aldossary, Wejdan
    Alghamdi, Ebtehal
    Aljammaz, Aljawhra
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [4] The Public Key Encryption to Improve the Security on Wireless Sensor Networks
    Xu, Chungen
    Ge, Yanhong
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 1, PROCEEDINGS: COMPUTING SCIENCE AND ITS APPLICATION, 2009, : 11 - +
  • [5] Ways to improve the information security in Wireless Sensor Networks.
    Wasimi, Delshad
    DILEMAS CONTEMPORANEOS-EDUCACION POLITICA Y VALORES, 2019, 6
  • [6] Security for Wireless Sensor Networks
    Wang, Yilin
    Qin, Maosheng
    INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 844 - 848
  • [7] Security in Wireless Sensor Networks
    Obaidat, Mohammed S.
    Nicopolitidis, Petros
    Li, Jung-Shian
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 101 - 103
  • [8] Security in wireless sensor networks
    Giruka, Venkata C.
    Singhal, Mukesh
    Royalty, James
    Varanasi, Srilekha
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 1 - 24
  • [9] On the security of wireless sensor networks
    Roman, R
    Zhou, JY
    Lopez, J
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 681 - 690
  • [10] Security in wireless sensor networks
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 60 - 66