Open Access Open Access  Restricted Access Subscription or Fee Access

Cryptography Based Message Authentication for Wireless Sensor Network

Manishkumar H. Patel, Dipti Sakhare

Abstract


Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. Numerous authentication schemes have been proposed in the past for protecting authenticity and integrity in wireless sensor network. To address these issues, we present a Constrained Function based en-route Filtering (CFA) scheme for message Authentication in wireless sensor networks in which each node have an en-route filtering capability. The authentication is used along with the RSA algorithm to provide more security. For authentication we are mainly going to implement Off line and On line step of CFA scheme and we are going to compare the energy consumption with and without CFA scheme.

Keywords


Authentication, En-Route Filtering, Security, Sensor Networks.

Full Text:

PDF

References


J. Deng, R. Han, S. Mishra. Defending against Path-based DoS Attacks in Wireless Sensor Networks. In ACM SASN, 2005.

D. Liu, P. Ning, ―Establishing Pairwise Keys in Distributed Sensor Networks,‖ ACM CCS, 2003.

D. Liu and P. Ning, ―Multi-Level μTESLA: Broadcast Authentication for Distributed Sensor Networks,‖ ACM Transactions in Embedded Computing Systems (TECS), Vol. 3, No. 4, pages 800-836, November 2004.

D. J. Malan, M. Walsh, and M. D. Smith, ―Implementaing Public-Key Infrastructure for Sensor Networks,‖ ACM Trans. on Sensor Networks, 2008.

A. Perrig, R. Szewczyk, V. Wen, D. Culler, and Doug Tygar, ―SPINS: Security Protocols for Sensor Networks,‖ ACM MobiCom, 2001.

K. Ren, W. Lou, and Y. Zhang, ―LEDS: providing location-aware end-toend data security in wireless sensor networks,‖ IEEE INFOCOM, 2006.

C. M. Yu, T. Y. Chi, C. S. Lu, and S. Y. Kuo, ―A Constrained Random Perturbation Vector-Based Pairwise Key Establishment Scheme for Wireless Sensor Networks,‖ ACM MobiHoc, 2008.

F. Ye, H. Luo, S. Lu, and L. Zhang, ―Statistical En-route Filtering of Injected False Data in Sensor Networks,‖ IEEE INFOCOM, 2004.

H. Yang, F. Ye, Y. Yuam, S. Lu, and W. Arbaugh, ―Toward Resilient Security in Wireless Sensor Networks,‖ ACM MobiHoc, 2005.

S. Zhu, S.Setia, and S.Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In ACM CCS, 2003.

S. Zhu, S. Setia, S. Jajodia, and P. Ning, ―An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks,‖ IEEE S&P, 2004.

W. Zhang, N. Subramanian, and G. Wang, ―Lightweight and Compromise-Resilient Message Authentication in Sensor Networks,‖

Anoop MS Tata Elxsi Ltd, India ―public key cryptography‖

C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, ―Non-interactive pairwise key establishment for sensor networks,‖ IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 556–569, Sep. 2010.

C.-M. Yu, C.-S. Lu, and S.-Y Kuo, ―A constrained function based authentication scheme for sensor networks,‖ in Proc. IEEEWireless Communications & Networking Conf. (WCNC), Budapest, Hungary, 2009.

C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, ―A DoS-resilient en-route filtering scheme for sensor networks,‖ in Proc. ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, LA, 2009, (poster).

F. Ye, H. Luo, S. Lu, and L. Zhang, ―Statistical en-route filtering of injected false data in sensor networks,‖ in Proc. IEEE Conf. Computer Communications (INFOCOM), Hong Kong, China, 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.