On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks

被引:0
|
作者
K. Nirmal Raja
M. Marsaline Beno
机构
[1] St.Xaviers Catholic College of Engineering,Department of Electrical and Electronic Engineering
来源
Journal of Medical Systems | 2014年 / 38卷
关键词
Wireless sensor network; DOS attack; Security; Fiege Fiat Shamir algorithm; Watchdog mechanism;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN’s has many constrictions, including low computation capability, less memory,limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.
引用
收藏
相关论文
共 50 条
  • [31] An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks
    Przybocki, Patryk
    Vassilakis, Vassilios G.
    SENSORS, 2023, 23 (05)
  • [32] Insider Attacks Against Multi-factor Authentication Protocols for Wireless Sensor Networks
    Li W.-T.
    Wang D.
    Wang P.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2375 - 2391
  • [33] A DoS-Resilient Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
    Wang, Fei
    Zhang, Yujun
    Xu, Yongjun
    Wu, Lin
    Diao, Boyu
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 1096 - 1102
  • [34] Data Authentication Scheme for Unattended Wireless Sensor Networks against a Mobile Adversary
    Reddy, Sasi Kiran V. L.
    Ruj, Sushmita
    Nayak, Amiya
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1836 - 1841
  • [35] Securing Underwater Sensor Networks Against Routing Attacks
    Dargahi, Tooska
    Javadi, Hamid H. S.
    Shafiei, Hosein
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 2585 - 2602
  • [36] Securing Underwater Sensor Networks Against Routing Attacks
    Tooska Dargahi
    Hamid H. S. Javadi
    Hosein Shafiei
    Wireless Personal Communications, 2017, 96 : 2585 - 2602
  • [37] An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
    Moghadam, Mostafa Farhadi
    Nikooghadam, Mahdi
    Al Jabban, Maytham Azhar Baqer
    Alishahi, Mohammad
    Mortazavi, Leili
    Mohajerzadeh, Amirhossein
    IEEE ACCESS, 2020, 8 : 73182 - 73192
  • [38] Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
    Singh, Akansha
    Awasthi, Amit K.
    Singh, Karan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1881 - 1898
  • [39] A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    Lee, Sang-Gon
    Lee, HoonJae
    ETRI JOURNAL, 2013, 35 (05) : 889 - 899
  • [40] The Novel Authentication Scheme Based on Theory of Quadratic Residues for Wireless Sensor Networks
    Liu, Chen-Xu
    Liu, Yun
    Zhang, Zhen-Jiang
    Cheng, Zi-Yao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,