On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks

被引:0
|
作者
K. Nirmal Raja
M. Marsaline Beno
机构
[1] St.Xaviers Catholic College of Engineering,Department of Electrical and Electronic Engineering
来源
关键词
Wireless sensor network; DOS attack; Security; Fiege Fiat Shamir algorithm; Watchdog mechanism;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN’s has many constrictions, including low computation capability, less memory,limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.
引用
收藏
相关论文
共 50 条
  • [31] Security enhanced user authentication scheme for wireless sensor network
    Jannati, Hoda
    Falahati, Abolfazl
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 215 - 228
  • [32] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [33] PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks
    Kim, Daehee
    An, Sunshin
    IEEE SENSORS JOURNAL, 2016, 16 (08) : 2217 - 2218
  • [34] A localised clustering scheme to detect attacks in wireless sensor network
    Joby, P. P.
    Sengottuvelan, P.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (03) : 211 - 222
  • [35] Staggered TESLA: A multicast authentication scheme resistant to DoS attacks
    Li, Q
    Trappe, W
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1670 - 1675
  • [36] A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks
    Ko, Lee-Chun
    2008 IEEE INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2008), 2008, : 191 - 195
  • [37] Securing the wireless LANs against internal attacks
    Kbar, Ghassan
    Mansoor, Wathiq
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 814 - +
  • [38] A Novel Framework of Defense System Agaist DoS Attacks in Wireless Sensor Networks
    Xi, Ouyang
    Tian Bin
    Li Qi
    Zhang Jian-yi
    Hu Zheng-ming
    Xin Yang
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [39] Active cache based defense against DoS attacks in wireless mesh network
    Santhanam, Lakshmi
    Nandiraju, Deepti
    Nandiraju, Nagesh
    Agrawal, Dharma P.
    2007 2ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, VOLS 1 AND 2, 2007, : 419 - +
  • [40] Securing DV-Hop localization against wormhole attacks in wireless sensor networks
    Chen, Honglong
    Lou, Wei
    Wang, Zhi
    Wu, Junfeng
    Wang, Zhibo
    Xia, Aihua
    PERVASIVE AND MOBILE COMPUTING, 2015, 16 : 22 - 35