Total views : 200

Proficient Techniques and Protocols for the Identification of Attacks in WSN: A Review

Affiliations

  • School of Electrical and Computer Science Engineering, Shoolini University Bhajol, Solan - 173229, Himachal Pradesh, India

Abstract


Objectives: In WSN (Wireless Sensor Network) attacks are the central concern. In this paper, we discuss various authentication techniques and protocols for detection of attacks in WSN). Our scope be situated on the way to take new authentication technique by analyzing various techniques and protocols for detection of attack. This technique solves the problems in existing techniques like micro Timed Sufficient Streaming Loss Tolerant Authentication protocol (μ TESLA), Secured Network Encryption Protocol (SNEP), Long Term Equity Anticipation Security (LEAP) ad node authentication all these techniques require an extra amount of energy for computational cost is very high. Analysis: Wireless Sensor Network (WSN) is used in various applications to monitor the sensitive environment. These applications have a high impact in human pursuit, battlefield monitoring and surround watching. After the deployment of the sector nodes at respective places the manual maintenance and monitoring is minimum for long interval of time due to these conditions it creates security problems at sensitive areas wherever the appliance is deployed. In this environment anyone will comes within the network to modify and hack the data. Due to this reason interference of the network also suffers from several constraints like low computation capability and restricted energy. These constraints conjointly build a security as a challenge in Wireless Sensor Network. In this paper we have various security protocols and techniques to beat these problems. Findings: By the limitations of resource we analysis and find the Zero Knowledge Protocol with Interlock Protocol for Sybil attack detection in WSN. These techniques having a less bandwidth, small computational power and less memory space.

Keywords

Group Key Management, Long Term Equity Anticipation Security (LEAP), Micro Timed Sufficient Streaming Loss Tolerant Authentication Protocol (μ TESLA), Wireless Sensor Networks (WSN), Zero Knowledge Verification Protocol.

Full Text:

 |  (PDF views: 197)

References


  • Naik S, Shekokar N. Conservation of energy in wireless sensor network by preventing denial of sleep attack. Procedia Computer Science. 2015; 45:370–9.
  • Kilian J, Micali S, Ostrovsky R, editors. Minimum resource zero knowledge proofs. IEEE 30th Annual Symposium on Foundations of Computer Science; Research Triangle Park. 1989. p. 474–9.
  • Anh B, Huy P, editors. A zero-knowledge protocol based on a new product of durations. IEEE International Symposium on Signal Processing and Information Technology (ISSPIT); 2012. p. 1–6.
  • Demirbas M, Song Y, editors. An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the International Symposium on on World of Wireless, Mobile and Multimedia Networks; IEEE Computer Society. Buffalo-Niagara Falls. 2006. p. 564–70.
  • Vasudeva A, Sood M. Sybil attack on lowest id clustering algorithm in the mobile ad hoc network. International Journal of Network Security and its Applications. 2012; 4(5):135.
  • Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks. 2003; 1(2):293–315.
  • Ramesh P, Fem P, Santhi B. Review on Security Protocols in Wireless Sensor Networks. Journal of Theoretical and Applied Information Technology. 2012; 38(1):1–4.
  • Boyle D, Newe T. Securing wireless sensor networks: Security architectures. Journal of Networks. 2008; 3(1):65–77.
  • Dhawale SD, Hogade B, Patil S. Design and Implementation of a Dynamic Key Management Scheme for Node Authentication Security in Wireless Sensor Networks. IJSETR. 2005; 4(4):1–4.
  • Khan WZ, Aalsalem MY, Saad MNBM, Xiang Y. Detection and mitigation of node replication attacks in wireless sensor networks: A survey. International Journal of Distributed Sensor Networks. 2013; 2013:22.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.