scholarly journals Reliable Broadcast Message Authentication in Wireless Sensor Networks

Author(s):  
Taketsugu Yao ◽  
Shigeru Fukunaga ◽  
Toshihisa Nakai
2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Udaya Suriya Raj Kumar Dhamodharan ◽  
Rajamani Vayanaperumal

Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.


2013 ◽  
Vol 11 (3) ◽  
pp. 1221-1236 ◽  
Author(s):  
Marcos A. Simplicio ◽  
Bruno T. de Oliveira ◽  
Cintia B. Margi ◽  
Paulo S.L.M. Barreto ◽  
Tereza C.M.B. Carvalho ◽  
...  

Author(s):  
Tae Ho Cho ◽  
Su Man Nam

Wireless sensor networks (WSNs) suffer serious damage from false positive and negative attacks due to their hardware restrictions. The sensor network causes both unnecessary energy consumption and information loss through false reports and normal reports, which include false message authentication codes (MACs). A probabilistic voting-based filtering scheme (PVFS) effectively detects the two types of attacks through a pre-defined threshold, which is the number of detected false MACs in a report. Since the threshold significantly influences the ability to detect attacks, the sensor network should be simulated to ensure proper function. In this paper, we describe the development and simulation of a PVFS-based WSN using a discrete event system specification. The experimental results showed that PVFS with a threshold of 2 reduced energy usage by about 16% and improved the detected false reports as compared with a PVFS with a threshold of 3.


Sign in / Sign up

Export Citation Format

Share Document