EASS: Encryption and Authentication Based Security Scheme to Prevent Power Exhausting Attacks in Wireless Sensor Networks

被引:0
作者
Muthumanickam, K. [1 ]
Elango, S. [2 ]
Mahesh, P. C. Senthil [3 ]
Vijayalakshmi, P. [4 ]
机构
[1] Kongunadu Coll Engn & Technol, Dept Informat Technol, Thottiam, Tamil Nadu, India
[2] Arunai Engn Coll, Dept Elect & Commun Engn, Tiruvannamalai, Tamil Nadu, India
[3] Annamacharya Inst Technol & Sci, Rajampet, Andra Pradesh, India
[4] Gnamani Coll Engn, Namakkal 637018, Tamil Nadu, India
关键词
Authentication; denial of sleep; encryption; energy consumption; wireless sensor networks; ENERGY; PROTOCOL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks are a type of network designed for situations which lack infrastructure and are resource constrained. Furthermore, they are dynamic in nature. As energy is sometimes in scarce supply for these networks, one of the foremost serious threats is, the Denial of Sleep (DeoS) attacks; such attacks fatigue the device nodes and reduce the device's overall lifetime. The schemes for these networks proposed in the past do not offer optimal power energy consumption. Hence, in this paper, we present an Encryption and Authentication based Security Scheme (EASS) to combat DeoS attacks. EASS is based on the use of SHA and symmetric cryptography to prevent power draining attacks, thereby extending the lifetime of the sensor nodes of a power-constrained network. The proposed lightweight security scheme imposes low computational requirements, and performs better than other solutions found in the literature. Simulation results indicate that our suggestion uses power intelligently and might decrease the efficacy of DeoS attacks.
引用
收藏
页码:253 / 273
页数:21
相关论文
共 28 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
Alrajesh Nabil Ali, 2014, AD HOC SENS WIREL NE, V22, P135
[3]   MAC Essentials for Wireless Sensor Networks [J].
Bachir, Abdelmalik ;
Dohler, Mischa ;
Watteyne, Thomas ;
Leung, Kin K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (02) :222-248
[4]   Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks [J].
Cao, Xianghui ;
Shila, Devu Manikantan ;
Cheng, Yu ;
Yang, Zequ ;
Zhou, Yang ;
Chen, Jiming .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05) :816-829
[5]  
Capossele A. T., 2016, P 13 ANN IEEE INT C, P1, DOI DOI 10.1109/SAHCN.2016.7732978
[6]   Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks [J].
Carrano, Ricardo C. ;
Passos, Diego ;
Magalhaes, Luiz C. S. ;
Albuquerque, Celio V. N. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :181-194
[7]   Time-division secret key protocol for wireless sensor networking [J].
Chen, J. -L. ;
Ma, Y. -W. ;
Wang, X. ;
Huang, Y. -M. ;
Lai, Y. -F. .
IET COMMUNICATIONS, 2011, 5 (12) :1720-1726
[8]  
Gelenbe E., 2018, P IEEE INT C COMM WO, P1
[9]  
Gunasekaran M., 2017, SECURITY COMMUNICATI, V2017
[10]   IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks [J].
Han, Guangjie ;
Jiang, Jinfang ;
Shen, Wen ;
Shu, Lei ;
Rodrigues, Joel .
IET INFORMATION SECURITY, 2013, 7 (02) :97-105