TY - GEN
T1 - Energy saving replay attack prevention in clustered wireless sensor networks
AU - Ghosal, Amrita
AU - Saha, Aadirupa
AU - Das Bit, Sipra
PY - 2013
Y1 - 2013
N2 - Nodes in a wireless sensor network (WSN) are susceptible to various attacks primarily due to their nature of deployment and unguarded communication. Therefore, protecting such networks from attacks is a major challenge. We propose a scheme where sink, the resource-rich node, keeps track of attack threat based on statistics of network traffic. If any threat is apprehended, the sink and nodes together start analysis on each node's contribution towards the network traffic to confirm the attack (if any) and identify the attacked node. Unlike existing attack prevention scheme, which incorporates securing mechanism starting from the network in operation, the present scheme starts secure communication only when it detects attack thereby reducing securing overheads significantly. As there is energy constraint in WSN, the main objective of this work is to reduce energy consumption while keeping the network secured. The other objective is to reduce attack detection time concomitantly so that the network can start secure communication before the attack causes any significant damage in the network. Performance of the scheme is compared with one of the state-of-the-art scheme. Qualitative analysis is done considering the performance metrics of communication, computation and storage overheads while quantitative analysis is done considering energy consumption, detection time and detection probability as performance metrics. Results confirm significant improvement over the competing scheme in respect to all the overheads.
AB - Nodes in a wireless sensor network (WSN) are susceptible to various attacks primarily due to their nature of deployment and unguarded communication. Therefore, protecting such networks from attacks is a major challenge. We propose a scheme where sink, the resource-rich node, keeps track of attack threat based on statistics of network traffic. If any threat is apprehended, the sink and nodes together start analysis on each node's contribution towards the network traffic to confirm the attack (if any) and identify the attacked node. Unlike existing attack prevention scheme, which incorporates securing mechanism starting from the network in operation, the present scheme starts secure communication only when it detects attack thereby reducing securing overheads significantly. As there is energy constraint in WSN, the main objective of this work is to reduce energy consumption while keeping the network secured. The other objective is to reduce attack detection time concomitantly so that the network can start secure communication before the attack causes any significant damage in the network. Performance of the scheme is compared with one of the state-of-the-art scheme. Qualitative analysis is done considering the performance metrics of communication, computation and storage overheads while quantitative analysis is done considering energy consumption, detection time and detection probability as performance metrics. Results confirm significant improvement over the competing scheme in respect to all the overheads.
KW - Authentication
KW - Encryption
KW - Integrity
KW - Replay attack
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=84883147798&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-39693-9_9
DO - 10.1007/978-3-642-39693-9_9
M3 - Conference contribution
AN - SCOPUS:84883147798
SN - 9783642396922
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 82
EP - 96
BT - Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2013, Proceedings
T2 - Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013
Y2 - 3 August 2013 through 3 August 2013
ER -