Design and Development of an Enhanced Security Scheme Using RSA for Preventing False Data Injection in Wireless Sensor Networks

被引:5
|
作者
Sreevidya, B. [1 ]
Rajesh, M. [1 ]
Mamatha, T. M. [2 ]
机构
[1] Amrita Univ, Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru, India
[2] RV Coll Engn, Dept Comp Sci & Engn, Bengaluru, India
来源
AMBIENT COMMUNICATIONS AND COMPUTER SYSTEMS, RACCCS 2017 | 2018年 / 696卷
关键词
False data injection; Wireless sensor networks; Enroute filtering; Cryptography; RSA; Network simulator;
D O I
10.1007/978-981-10-7386-1_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are largely used in mission-critical applications such as border surveillance, intrusion detection, remote patient monitoring. These applications demand the data to be secured while processing as well as communicating. Data security during the processing phase is a largely researched area, and there exists enough number of techniques to achieve it. On the other hand, techniques to achieve data security during communication phase even though exist in multiple numbers, most of the techniques demand high processing capacity. This requirement leads to high energy consumption which is a challenge in the context of wireless sensor networks. So a technique which will provide data security during communication phase in a wireless sensor network-based application with minimal energy consumption will be a very good solution. The proposed scheme is to prevent false data injection in which malicious or compromised nodes inject false data into the WSN which will influence the decision making of the system. The proposed system provides an enhanced security scheme for preventing false data injection attack in WSN with an efficient reactive routing method. The proposed system addresses two parameters: authenticity of the nodes and the integrity of the data. The proposed system is simulated using Network Simulator 2 (NS2), and the results indicate that the scheme performs better than the existing schemes which provide either integrity of data or authentication of the sender.
引用
收藏
页码:225 / 236
页数:12
相关论文
共 50 条
  • [21] A New Scheme of Key Distribution using Implicit Security in Wireless Sensor Networks
    Chiang, Chien-Wen
    Lin, Chih-Chung
    Chang, Ray-I
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 151 - 155
  • [22] A Secret-Sharing-based Security Data Aggregation Scheme in Wireless Sensor Networks
    Liu, Xiaowu
    Ma, Wenshuo
    Yu, Jiguo
    Yu, Kan
    Xiang, Jiaqi
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 303 - 313
  • [23] A Data Collection Scheme Using Transformer Autoencoder in Wireless Sensor Networks
    Xu, Jiahui
    Li, Cuiran
    2024 INTERNATIONAL CONFERENCE ON UBIQUITOUS COMMUNICATION, UCOM 2024, 2024, : 332 - 336
  • [24] RSA Processor Design with Vedic Multiplier for Nodes in Wireless Sensor Networks
    Leelavathi, G.
    Shaila, K.
    Venugopal, K. R.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1254 - 1257
  • [25] An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    Hsiao, Tsung-Chih
    Liao, Yu-Ting
    Huang, Jen-Yan
    Chen, Tzer-Shyong
    Horng, Gwo-Boa
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3649 - 3664
  • [26] A group-based security scheme for wireless sensor networks
    Hamid, Md. Abdul
    Sarkar, A. M. Jehad
    ANNALS OF TELECOMMUNICATIONS, 2012, 67 (9-10) : 455 - 469
  • [27] A group-based security scheme for wireless sensor networks
    Md. Abdul Hamid
    A. M. Jehad Sarkar
    annals of telecommunications - annales des télécommunications, 2012, 67 : 455 - 469
  • [28] An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    Tsung-Chih Hsiao
    Yu-Ting Liao
    Jen-Yan Huang
    Tzer-Shyong Chen
    Gwo-Boa Horng
    Journal of Medical Systems, 2012, 36 : 3649 - 3664
  • [29] A False Data Filtering Scheme Using Cluster-Based Organization in Sensor Networks
    Liu, Zhixiong
    Wang, Jianxin
    Zhang, Xi
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [30] An Untraceable Data Sharing Scheme in Wireless Sensor Networks
    Chen, Dong
    Lu, Wei
    Xing, Weiwei
    Wang, Na
    SENSORS, 2019, 19 (01)