CFP last date
20 May 2024
Reseach Article

Cooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks

by Teenu Liza Thomas, P. Vijayalakshmi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 19
Year of Publication: 2013
Authors: Teenu Liza Thomas, P. Vijayalakshmi
10.5120/12596-9321

Teenu Liza Thomas, P. Vijayalakshmi . Cooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks. International Journal of Computer Applications. 71, 19 ( June 2013), 26-31. DOI=10.5120/12596-9321

@article{ 10.5120/12596-9321,
author = { Teenu Liza Thomas, P. Vijayalakshmi },
title = { Cooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 19 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number19/12596-9321/ },
doi = { 10.5120/12596-9321 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:36:04.149783+05:30
%A Teenu Liza Thomas
%A P. Vijayalakshmi
%T Cooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 19
%P 26-31
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative Bit-Compressed Authentication (CBA) is based on random graph characteristic of sensor node deployment and a cooperative bit-compressed authentication scenario with probability of neighboring nodes providing the necessary condition for CBA authentication. In this safest en-route is found out using client puzzle. Early detection and filtering of injected false data with CBA technique greatly saves energy adding a minor extra overhead at the en-route sensor nodes. The accompanied authentication information is bandwidth-efficient. Filtering of false data reduces the burden of the sink and in addition only very small fraction of injected bogus data needs to be checked by the sink. The high filtering probability, high reliability, throughput and energy saving of the CBA scheme is demonstrated in simulation results.

References
  1. Rongxing Lu. and Xiaodong Lin. , "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE transactions on parallel and distributed systems, vol. 23, no. 1, Jan. 2012.
  2. R. Szewczky, A. Mainwaring, J. Anderson, and D. Culler, "An Analysis of a Large Scale Habit Monitoring Application," Proc. Second ACM Int'l Conf. Embedded Networked Sensor Systems (Sensys '04), 2004.
  3. L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), 2002.
  4. R. Lu, X. Lin, C. Zhang, H. Zhu, P. Ho, and X. Shen, "AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network," Proc. IEEE Int'l Conf. Comm. (ICC '08), May 2008.
  5. F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM '04, Mar. 2004.
  6. K. Ren, W. Lou, and Y. Zhang, "Multi-User Broadcast Authentication in Wireless Sensor Networks," Proc. IEEE Sensor Ad Hoc Comm. Networks (SECON '07), June 2007.
  7. L. Zhou and C. Ravishankar, "A Fault Localized Scheme for False Report Filtering in Sensor Networks," Proc. Int'l Conf. Pervasive Services, (ICPS '05), pp. 59-68, July 2005.
  8. Daojing He and Sammy Chan, "DiCode: DoS Resistant and Distributed Code Dissemination in Wireless Sensor Networks," IEEE transaction on wireless communication, vol. 11, No. 5, May 2012.
  9. S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by- Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy, 2004.
  10. C. Boyd, W. Mao, and K. G. Paterson, "Key Agreement Using Statically Keyed Authenticators," Proc. Second Int'l Conf. Applied Cryptography and Network Security C (ACNS '04), pp. 248-262, 2004.
  11. J. Black and P. Rogaway, "Cbc Macs for Arbitrary-Length Messages: the Three-Key Constructions," J. Cryptology, vol. 18, no. 2, pp. 111-131, 2005.
  12. W. Mao, Modern Cryptography: Theory and Practice. Prentice Hall PTR, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor networks cooperative bit-compressed authentication false data injection en-route filtering