TY - JOUR
T1 - A lightweight security scheme for query processing in clustered wireless sensor networks
AU - Ghosal, Amrita
AU - DasBit, Sipra
AU - Cotae, Paul
N1 - Publisher Copyright:
© 2014 Elsevier Ltd. All rights reserved.
PY - 2015
Y1 - 2015
N2 - When wireless sensor networks (WSNs) are deployed in areas inaccessible by human beings, security becomes extremely important, as they are prone to different types of malicious attacks. We propose a scheme to build a security mechanism in a query-processing paradigm within WSNs with clustered architecture. This work aims to preserve the basic security features such as confidentiality and integrity as well as to protect from replay attack in presence of mote class attacker. Considering the limitations of such an attacker, the probability of attacking cluster head and member nodes is higher than attacking the base station. Paying attention to this fact, in all communication between cluster head and member nodes, the key is neither transmitted nor pre-deployed. Performance of the scheme is evaluated and compared through qualitative and quantitative analyses; results show the present scheme's dominance over the competing schemes.
AB - When wireless sensor networks (WSNs) are deployed in areas inaccessible by human beings, security becomes extremely important, as they are prone to different types of malicious attacks. We propose a scheme to build a security mechanism in a query-processing paradigm within WSNs with clustered architecture. This work aims to preserve the basic security features such as confidentiality and integrity as well as to protect from replay attack in presence of mote class attacker. Considering the limitations of such an attacker, the probability of attacking cluster head and member nodes is higher than attacking the base station. Paying attention to this fact, in all communication between cluster head and member nodes, the key is neither transmitted nor pre-deployed. Performance of the scheme is evaluated and compared through qualitative and quantitative analyses; results show the present scheme's dominance over the competing schemes.
UR - http://www.scopus.com/inward/record.url?scp=84927795180&partnerID=8YFLogxK
U2 - 10.1016/j.compeleceng.2014.03.014
DO - 10.1016/j.compeleceng.2014.03.014
M3 - Article
AN - SCOPUS:84927795180
SN - 0045-7906
VL - 41
SP - 240
EP - 255
JO - Computers and Electrical Engineering
JF - Computers and Electrical Engineering
IS - C
ER -