Abstract
A new routing rule detection and identity authentication mechanism based on the path sequence is proposed to cope with the vulnerability problem of wireless sensor networks (WSNs) against various attacks, especially in unattended environments. Then, the great permutation encryption algorithm (G-PEC) for WSN is proposed. Finally, a signature scheme against pollution attack based on linear network coding is improved. The results show that the proposed path sequence-based authentication method with the Contiki simulation platform can significantly reduce the computing overhead of sensor nodes and decrease the energy consumption and delay of nodes to a greater extent than the traditional authentication method. The G-PEC can effectively resist eavesdropping attack, and the new signature scheme does not need additional secure channels. The proposed mechanism also provides source message authentication.
Highlights
Wireless sensor network (WSN), a new network form, is partly similar to traditional networks and partly distinctive in terms of characteristics
The security requirements of WSNs based on IPv6 are introduced
After establishing a good route according to the routing protocol (RPL) in the WSN, a path sequence needs to be generated and the entire network needs to be informed about this configuration prior environment data transmission to ensure that the initialized routing table (RT) is well stored on each sensor
Summary
Wireless sensor network (WSN), a new network form, is partly similar to traditional networks and partly distinctive in terms of characteristics. A wired network is difficult to attack because of its physical isolation, whereas WSNs are affected by security threats, such as message injection, information tampering, and eavesdropping and interception. In the studies on security based on WSNs, cryptographic mechanisms are often proposed to effectively resist attacks, such as message injection, eavesdropping, and tampering. End-to-end encryption mechanisms can prevent message eavesdropping from captured intermediate nodes, but the encryption mechanism needs to establish a key between end nodes. This approach is not suitable for multicasting and broadcasting systems. In view of the vulnerability of WSNs to various network attacks, this paper discusses routing strategies and data security technologies. The great permutation encryption algorithm (G-PEC) can effectively resist eavesdropping attacks and provide source message authentication
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Online and Biomedical Engineering (iJOE)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.