Authentication and overhearing to prevent internal and external attacks in WSN

  • Authors

    • Siri Maidhili R
    • Karthik GM
    2018-03-19
    https://doi.org/10.14419/ijet.v7i2.8.10489
  • Wireless Sensor Networks, Broadcast authentication scheme, elliptical Curve Cryptography, overhearing, External attacks, Internal attacks, ZigBee Communication.
  • Abstract

    Wireless Sensor Networks are usually the assortation of sensors, which are versatile in sensing the data based on multihued exertions. The cardinal bulge with the sensor networks is its dispersed nature. Since they are spread over, they sense and forward data from their dispersed areas. They consume high energy resources and vulnerable to various attacks. To prevail this bulge, source identity (signature) based authentication scheme is proposed on ECC to prevent external attacks and a neighbor monitoring scheme is proposed by overhearing to prevent internal attacks. Now the cardinal strike with the sensor networks are its bounded energy resources, they have a very limited / less energy resources, they cannot have a hefty application assignment. To prevail this strike and to improve the energy efficiency, a low energy consumption MAC protocol is acquainted called the IEEE 802.15.4 / ZigBee standards un the MAC layer, through which the data forwarding among the networks devours very low energy when compared to all other traditional methods. The main objective of the proposed work is to perform broadcast after authentication, to prevent resource consuming attacks through authentication externally and to construct a monitoring table for each node by overhearing and detecting them based on their activities if they are malicious to provide internal security to the network. The proposed work attains a minimal energy wastage along with security integrated in WSN communication. The ratio of efficiency comparisons of the broadcasting authentication scheme and monitoring scheme for the traditional and the proposed works for the factors secure authentication / monitoring and energy consumption is resulted to be as 7:2. Thus the proposed system has a higher endorsed based on the generated results.

  • References

    1. [1] Zouinkhi, A., Mekki, K. and Abdelkrim, M.N., 2015. Application and network layers design for wireless sensor network to supervise chemical active product warehouse. arXiv preprint arXiv:1501.01193.

      [2] Zouinkhi, A., Mekki, K. and Abdelkrim, M.N., 2015. Application and network layers design for wireless sensor network to supervise chemical active product warehouse. arXiv preprint arXiv:1501.01193.

      [3] Alrajeh, N.A., Lloret, J. and Canovas, A., 2014. A framework for obesity control using a wireless body sensor network. International Journal of Distributed Sensor Networks, 10(7), p.534760.

      [4] Singh, N., Singh, A.K. and Singh, V.K., 2015. Design and performance of wearable ultrawide band textile antenna for medical applications. Microwave and optical technology Letters, 57(7), pp.1553-1557.

      [5] Garcia, M., Catalá, A., Lloret, J. and Rodrigues, J.J., 2011, June. A wireless sensor network for soccer team monitoring. In Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference on (pp. 1-6). IEEE.

      [6] Al-Karaki, J.N. and Kamal, A.E., 2004. Routing techniques in wireless sensor networks: a survey. IEEE wireless communications, 11(6), pp.6-28.

      [7] Zhang, Z., Zhu, H., Luo, S., Xin, Y. and Liu, X., 2017. Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks. IEEE Access, 5, pp.12088-12102.

      [8] Kohno, E., Ohta, T. and Kakuda, Y., 2009, March. Secure decentralized data transfer against node capture attacks for wireless sensor networks. In Autonomous Decentralized Systems, 2009. ISADS'09. International Symposium on (pp. 1-6). IEEE.

      [9] Kohno, E., Ohta, T., Kakuda, Y. and Aida, M., 2011. Improvement of dependability against node capture attacks for wireless sensor networks. IEICE TRANSACTIONS on Information and Systems, 94(1), pp.19-26.

      [10] Tanabe, N., Kohno, E. and Kakuda, Y., 2012, November. An impersonation attack detection method using bloom filters and dispersed data transmission for wireless sensor networks. In Green Computing and Communications (GreenCom), 2012 IEEE International Conference on (pp. 767-770). IEEE.

      [11] Liu, D. and Ning, P., 2004. Multilevel μTESLA: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 3(4), pp.800-836.

      [12] Liu, D. and Ning, P., 2003, February. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. In NDSS.

      [13] Liu, A. and Ning, P., 2008, April. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on Information processing in sensor networks (pp. 245-256). IEEE Computer Society.

      [14] Duan, M.J. and Xu, J., 2011. An efficient location-based compromise-tolerant key management scheme for sensor networks. Information Processing Letters, 111(11), pp.503-507.

      [15] Ren, K., Lou, W., Zeng, K. and Moran, P.J., 2007. On broadcast authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 6(11).

      [16] Gura, N., Patel, A., Wander, A., Eberle, H. and Shantz, S.C., 2004, August. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In International workshop on cryptographic hardware and embedded systems (pp. 119-132). Springer, Berlin, Heidelberg.

      [17] Czypek, P., Heyse, S. and Thomae, E., 2012, September. Efficient implementations of MQPKS on constrained devices. In International Workshop on Cryptographic Hardware and Embedded Systems (pp. 374-389). Springer, Berlin, Heidelberg.

      [18] Wang, L. and Xiao, Y., 2006. A survey of energy-efficient scheduling mechanisms in sensor networks. Mobile Networks and Applications, 11(5), pp.723-740.

      [19] Yu, M., Malvankar, A. and Foo, S.Y., 2006, June. An energy-efficient path availability routing algorithm for mobile ad hoc sensor networks. In Communications, 2006. ICC'06. IEEE International Conference on (Vol. 4, pp. 1885-1890). IEEE.

      [20] Jardosh, S. and Ranjan, P., 2008, January. A survey: Topology control for wireless sensor networks. In Signal Processing, Communications and Networking, 2008. ICSCN'08. International Conference on (pp. 422-427). IEEE.

      [21] Varga, A. and Hornig, R., 2008, March. An overview of the OMNeT++ simulation environment. In Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops (p. 60). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

      [22] Howitt, I. and Gutierrez, J.A., 2003, March. IEEE 802.15. 4 low rate-wireless personal area network coexistence issues. In Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE (Vol. 3, pp. 1481-1486). IEEE.

      [23] Xia, C., Liu, W. and Deng, Q., 2015. Cost minimization of wireless sensor networks with unlimited-lifetime energy for monitoring oil pipelines. IEEE/CAA Journal of AutomaticaSinica, 2(3), pp.290-295.

      [24] Qinqin, Z.Y.L.Z.W., 2005. ZigBee Wireless Communication Technology and Investigation on Its Application [J]. Process Automation Instrumentation, 6, p.002.

      [25] Aalto, L., Göthlin, N., Korhonen, J. and Ojala, T., 2004, June. Bluetooth and WAP push based location-aware mobile advertising system. In Proceedings of the 2nd international conference on Mobile systems, applications, and services (pp. 49-58). ACM.

      [26] Khedo, K.K., Perseedoss, R. and Mungur, A., 2010. A wireless sensor network air pollution monitoring system. arXiv preprint arXiv:1005.1737.

      [27] Butun, I., Morgera, S.D. and Sankar, R., 2014. A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), pp.266-282.

      [28] Ghaffari, A., 2015. Congestion control mechanisms in wireless sensor networks: A survey. Journal of network and computer applications, 52, pp.101-115.

      [29] Shen, H., He, S., Yu, L. and Sarker, A., 2017, March. Prediction-based redundant data elimination with content overhearing in wireless networks. In Pervasive Computing and Communications (PerCom), 2017 IEEE International Conference on (pp. 50-58). IEEE.

      [30] Sett, R. and Banerjee, I., 2015, August. An overhearing based routing scheme for Wireless Sensor Networks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 2076-2082). IEEE.

      [31] Abbasi, A.A. and Younis, M., 2007. A survey on clustering algorithms for wireless sensor networks. Computer communications, 30(14-15), pp.2826-2841.

      [32] Shim, K.A., 2017. BASIS: A practical multi-user broadcast authentication scheme in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 12(7), pp.1545-1554.

      [33] Tanabe, N., Kohno, E. and Kakuda, Y., 2013, July. A path authenticating method using bloom filters against impersonation attacks on relaying nodes for wireless sensor networks. In Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd International Conference on (pp. 357-361). IEEE.

      [34] Chang, Q., Zhang, Y.P. and Qin, L.L., 2010, June. A node authentication protocol based on ECC in WSN. In Computer Design and Applications (ICCDA), 2010 International Conference on (Vol. 2, pp. V2-606). IEEE.

      [35] Mahmood, Z., Ning, H. and Ghafoor, A., 2016, December. Lightweight Two-Level Session Key Management for End User Authentication in Internet of Things. In Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2016 IEEE International Conference on (pp. 323-327). IEEE.

      [36] Ding, C., Yang, L. and Wu, M., 2015, December. LFDD: Local False Data Detection for In-Network Aggregation in Wireless Sensor Networks. In Computational Intelligence and Design (ISCID), 2015 8th International Symposium on (Vol. 2, pp. 262-266). IEEE.

      [37] Sett, R. and Banerjee, I., 2015, August. An overhearing based routing scheme for Wireless Sensor Networks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 2076-2082). IEEE.

      [38] Ye, W., Heidemann, J. and Estrin, D., 2002. An energy-efficient MAC protocol for wireless sensor networks. In INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE (Vol. 3, pp. 1567-1576). IEEE.

      [39] Kurtoglu, A., Carletta, J. and Lee, K.S., Energy Consumption in Long-Range Linear Wireless Sensor Networks using LoRaWan and ZigBee.

      [40] Siraj, S., Gupta, A. and Badgujar, R., 2012. Network simulation tools survey. International Journal of Advanced Research in Computer and Communication Engineering, 1(4), pp.199-206.

      [41] Misra, S., Das, S. and Obaidat, M., 2014. Context-aware quality of service in wireless sensor networks. IEEE Communications Magazine, 52(6), pp.16-23.

      [42] Younis, O. and Fahmy, S., 2004. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on mobile computing, 3(4), pp.366-379.

      [43] Araghi, T.K., Zamani, M. and Mnaf, A.B.A., 2013, September. Performance analysis in reactive routing protocols in wireless mobile ad hoc networks using DSR, AODV and AOMDV. In Informatics and Creative Multimedia (ICICM), 2013 International Conference on (pp. 81-84). IEEE.

      [44] Mo, Y., Garone, E., Casavola, A. and Sinopoli, B., 2010, December. False data injection attacks against state estimation in wireless sensor networks. In Decision and Control (CDC), 2010 49th IEEE Conference on (pp. 5967-5972). IEEE.

      [45] T. Padmapriya and V.Saminadan, “Improving Performance of Downlink LTE-Advanced Networks Using Advanced Networks Using Advanced feedback Mechanisms and SINR Modelâ€, International Conference on Emerging Technology (ICET), vol.7, no.1, pp: 93, March 2014.

      [46] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.

  • Downloads

  • How to Cite

    Maidhili R, S., & GM, K. (2018). Authentication and overhearing to prevent internal and external attacks in WSN. International Journal of Engineering & Technology, 7(2.8), 477-487. https://doi.org/10.14419/ijet.v7i2.8.10489

    Received date: 2018-03-22

    Accepted date: 2018-03-22

    Published date: 2018-03-19