Ensuring basic security and preventing replay attack in a query processing application domain in WSN

Amrita Ghosal, Subir Halder, Sanjib Sur, Avishek Dan, Sipra Dasbit

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nodes in a wireless sensor network are susceptible to various attacks primarily due to their nature of deployment. Therefore, providing security to the network becomes a big challenge. We propose a scheme considering cluster architecture based on LEACH protocol to build a security mechanism in a query-processing paradigm within wireless sensor network. The scheme is capable of thwarting replay attack while ensuring essential properties of security such as authentication, data integrity and data freshness. Our scheme is lightweight as it employs symmetric key cryptography with very short-length key. We simulate our scheme to show its efficacy of providing basic security to the network as well as detecting replay attack in the sensor network. Further we compare our scheme with one of the existing schemes taking packet loss and packet rejection ratio as performance metrics.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2010 - International Conference, Proceedings
PublisherSpringer Verlag
Pages321-335
Number of pages15
EditionPART 3
ISBN (Print)3642121780, 9783642121784
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2010 International Conference on Computational Science and Its Applications, ICCSA 2010 - Fukuoka, Japan
Duration: 23 Mar 201026 Mar 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 3
Volume6018 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2010 International Conference on Computational Science and Its Applications, ICCSA 2010
Country/TerritoryJapan
CityFukuoka
Period23/03/1026/03/10

Keywords

  • Authentication
  • Data freshness
  • Data integrity
  • Denial of service attack
  • Replay attack

Fingerprint

Dive into the research topics of 'Ensuring basic security and preventing replay attack in a query processing application domain in WSN'. Together they form a unique fingerprint.

Cite this