Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Tamper-aware authentication framework for wireless sensor networks

Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of sensor nodes. Energy is a limited resource and as such, the need to develop energy efficient frameworks that ensure authentication and thwart tampering of deployed sensor nodes. In this study, a framework comprising an authentication algorithm with a hardware-based tamper detection and recovery procedure is proposed. An interrupt-driven tamper detection and recovery mechanism is employed to aid the isolation of compromised nodes. MD-5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 hash functions were reviewed and simulation done to select the most energy-efficient option (SHA-224) for use with the authentication algorithm. The proposed framework was compared with other existing authentication frameworks in the area of energy efficiency. The result show that the proposed framework is the most energy-efficient. The proposed framework, TinySec, SenSec and MiniSec were analysed against node subversion and false node attacks; the proposed framework can detect compromised nodes in all two attacks but the rest were only potent against false nodes and not against node subversion.

References

    1. 1)
      • 7. Saxena, M.: ‘Security in wireless sensor networks-a layer based classification’ (Department of Computer Science, Purdue University, 2007).
    2. 2)
      • 5. Jokhio, S.H., Jokhio, I.A., Kemp, A.H.: ‘Node capture attack detection and defence in wireless sensor networks’, IET Wirel. Sensor Syst., 2012, 2, (3), pp. 161169.
    3. 3)
      • 9. Karlof, C., Sastry, N., Wanger, D.: ‘TinySec: A link layer security architecture for wireless sensor networks’. Proc. of the 2nd Int. Conf. on Embedded Networked Sensor Systems, 2004.
    4. 4)
      • 17. Jadidoleslamy, J.: ‘A comprehensive comparison of attacks in wireless sensor networks’, Int. J. Comput. Commun. Netw. (IJCCN), 2014, 4, (1), p. 13.
    5. 5)
      • 10. Corin, R.D., Rusello, G., Salvadori, E.: ‘TinyKey: a light-weight architecture for wireless sensor networks securing real-world applications’. Eighth Int. Conf. on Wireless On-Demand Network Systems and Services (WONS), 2011.
    6. 6)
      • 2. Singh, M., Babbar, K., Jain, K.L.: ‘A survey on intrusion detection systems in wireless sensor networks’, Int. J. Wirel. Commun. Netw. Technol., 2014, 3, (3), pp. 4043.
    7. 7)
      • 20. Nunoo-Mensah, H., Boateng, K.O., Gadze, J.D.: ‘Comparative analysis of energy usage of hash functions in secured wireless sensor networks’, Int. J. Comput. Appl., 2015, 109, (11), pp. 2023.
    8. 8)
      • 11. Luk, M., Mezzour, G., Perrig, A., et al: ‘MiniSec: a secure sensor network communication architecture’. Proc. Of the 6th ACM Int. Conf. of Information Processing in Sensor Networks, 2007.
    9. 9)
      • 4. Becher, A., Benenson, Z., Dornseif, M.: ‘Tampering with motes: real-world physical attacks on wireless sensor networks’, Secur. Pervasive Comput. Lect. Notes Comput. Sci., 2006, 3934, pp. 104118.
    10. 10)
      • 14. Shah, V., Sharma, S.: ‘A review of existing security frameworks and encryption methods for wireless sensor networks’, Int. J. Innov. Adv. Comput. Sci. (IJIACS), 2014, 3, (2), pp. 9098.
    11. 11)
      • 13. Huang, J., Yanga, S., Daia, C.: ‘An efficient key management scheme for data-centric storage (ERP-DCS) wireless sensor networks’, IERI Procedia, 2013, 4, pp. 2531.
    12. 12)
      • 8. Perrig, A., Szewczyk, R., Wen, V., et al: ‘SPINS: security protocols for sensor networks’, Wirel. Netw., 8, (5), pp. 521534.
    13. 13)
      • 15. Liu, Y., Tong, X.: ‘Hyperchaotic system-based pseudorandom number generator’, IET Inf. Sec., 2016, 10, (6), pp. 433441.
    14. 14)
      • 12. Shao, M., Zhu, S., Zhang, W., et al: ‘pDCS: security and privacy support for data-centric sensor networks’, IEEE Trans. Mob. Comput., 2009, 8, (8), pp. 10231038.
    15. 15)
      • 6. Poornima, A.S., Amberker, B.B.: ‘Secure data collection using mobile data collector in clustered wireless sensor network’, IET Wirel. Sensor Syst., 2011, 1, (2), pp. 8595.
    16. 16)
      • 3. Ding, W., Laha, B., Yenduri, S.: ‘First stage detection of compromised nodes in sensor networks’. IEEE Sensors Applications Symp. (SAS) 2010, February 2010, pp. 2025.
    17. 17)
      • 1. Sen, J.: ‘A survey on wireless sensor network security’, Int. J. Commun. Netwo. Inf. Secur. (IJCNIS), 2009, 1, (2), pp. 5578.
    18. 18)
      • 16. Raymond, D.R., Midkiff, S.F.: ‘Denial-of-Service in wireless sensor networks: attacks and defenses’, IEEE Pervasive Comput., 2008, 7, (1), pp. 7481.
    19. 19)
      • 18. Wang, Y., Attebury, G., Ramamurthy, B.: ‘A survey of security issues in wireless sensor networks’, IEEE Commun. Surv. Tutor., 2006, 8, (2), p. 23.
    20. 20)
      • 19. Odey, A.J., Li, D.: ‘Low power transceiver design parameters for wireless sensor networks’, Wirel. Sens. Netw., 2012, 4,(10), pp. 243249.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2015.0131
Loading

Related content

content/journals/10.1049/iet-wss.2015.0131
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address