Cooperative Bit-Compressed Authentication Scheme against Compromised Node Attacks in Wireless Sensor Networks
نویسندگان
چکیده
Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative BitCompressed Authentication (CBA) is based on random graph characteristic of sensor node deployment and a cooperative bit-compressed authentication scenario with probability of neighboring nodes providing the necessary condition for CBA authentication. In this safest en-route is found out using client puzzle. Early detection and filtering of injected false data with CBA technique greatly saves energy adding a minor extra overhead at the en-route sensor nodes. The accompanied authentication information is bandwidth-efficient. Filtering of false data reduces the burden of the sink and in addition only very small fraction of injected bogus data needs to be checked by the sink. The high filtering probability, high reliability, throughput and energy saving of the CBA scheme is demonstrated in simulation results.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملFuzzy-based Multiple Path Selection Method for Improving Energy Efficiency in Bandwidth-efficient Cooperative Authentications of Wsns
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are limited. The compromised nodes can inject false data into the network injecting false data attacks. The injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing false alarms in a sink. A bandwidth-efficient cooperative authentication scheme detect...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملFiltering Injected False Data in Wireless Sensor Network Using Bandwidth Efficient Cooperative Authentication Scheme
www.ijeist.in Abstract— Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and Sybil attacks. In addition, wireless sensor networks may also suffer from Injecting false data attack. For an injecting false data attack, an adversary first compromises several ...
متن کاملRefining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism
Wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. When a sensor node generates report after being triggered by a special event, it will send the report to a data collection unit (also known as sink) through an established routing path. Wireless sensor networks are usually deployed a...
متن کامل