@inproceedings{99295b892e0b4cb6b8f317b9e9cf0892,
title = "Ensuring basic security and preventing replay attack in a query processing application domain in WSN",
abstract = "Nodes in a wireless sensor network are susceptible to various attacks primarily due to their nature of deployment. Therefore, providing security to the network becomes a big challenge. We propose a scheme considering cluster architecture based on LEACH protocol to build a security mechanism in a query-processing paradigm within wireless sensor network. The scheme is capable of thwarting replay attack while ensuring essential properties of security such as authentication, data integrity and data freshness. Our scheme is lightweight as it employs symmetric key cryptography with very short-length key. We simulate our scheme to show its efficacy of providing basic security to the network as well as detecting replay attack in the sensor network. Further we compare our scheme with one of the existing schemes taking packet loss and packet rejection ratio as performance metrics.",
keywords = "Authentication, Data freshness, Data integrity, Denial of service attack, Replay attack",
author = "Amrita Ghosal and Subir Halder and Sanjib Sur and Avishek Dan and Sipra Dasbit",
year = "2010",
doi = "10.1007/978-3-642-12179-1_28",
language = "English",
isbn = "3642121780",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
number = "PART 3",
pages = "321--335",
booktitle = "Computational Science and Its Applications - ICCSA 2010 - International Conference, Proceedings",
edition = "PART 3",
note = "2010 International Conference on Computational Science and Its Applications, ICCSA 2010 ; Conference date: 23-03-2010 Through 26-03-2010",
}