Abstract

A new routing rule detection and identity authentication mechanism based on the path sequence is proposed to cope with the vulnerability problem of wireless sensor networks (WSNs) against various attacks, especially in unattended environments. Then, the great permutation encryption algorithm (G-PEC) for WSN is proposed. Finally, a signature scheme against pollution attack based on linear network coding is improved. The results show that the proposed path sequence-based authentication method with the Contiki simulation platform can significantly reduce the computing overhead of sensor nodes and decrease the energy consumption and delay of nodes to a greater extent than the traditional authentication method. The G-PEC can effectively resist eavesdropping attack, and the new signature scheme does not need additional secure channels. The proposed mechanism also provides source message authentication.

Highlights

  • Wireless sensor network (WSN), a new network form, is partly similar to traditional networks and partly distinctive in terms of characteristics

  • The security requirements of WSNs based on IPv6 are introduced

  • After establishing a good route according to the routing protocol (RPL) in the WSN, a path sequence needs to be generated and the entire network needs to be informed about this configuration prior environment data transmission to ensure that the initialized routing table (RT) is well stored on each sensor

Read more

Summary

Introduction

Wireless sensor network (WSN), a new network form, is partly similar to traditional networks and partly distinctive in terms of characteristics. A wired network is difficult to attack because of its physical isolation, whereas WSNs are affected by security threats, such as message injection, information tampering, and eavesdropping and interception. In the studies on security based on WSNs, cryptographic mechanisms are often proposed to effectively resist attacks, such as message injection, eavesdropping, and tampering. End-to-end encryption mechanisms can prevent message eavesdropping from captured intermediate nodes, but the encryption mechanism needs to establish a key between end nodes. This approach is not suitable for multicasting and broadcasting systems. In view of the vulnerability of WSNs to various network attacks, this paper discusses routing strategies and data security technologies. The great permutation encryption algorithm (G-PEC) can effectively resist eavesdropping attacks and provide source message authentication

State of the art
Path sequence routing detection and authentication in WSN
General applicability of attack models
Analysis of system simulation performance
Global coding vector replacement encryption based on network coding
Homomorphic signature scheme for anti-pollution attack
Performance analysis
Conclusion
Author
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.