scholarly journals Constrained Function-Based Message Authentication for Sensor Networks

2011 ◽  
Vol 6 (2) ◽  
pp. 407-425 ◽  
Author(s):  
Chia-Mu Yu ◽  
Yao-Tung Tsou ◽  
Chun-Shien Lu ◽  
Sy-Yen Kuo
2014 ◽  
Vol 29 (1) ◽  
pp. 53-68 ◽  
Author(s):  
Zheng Gong ◽  
Pieter Hartel ◽  
Svetla Nikova ◽  
Shao-Hua Tang ◽  
Bo Zhu

2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Udaya Suriya Raj Kumar Dhamodharan ◽  
Rajamani Vayanaperumal

Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.


Sign in / Sign up

Export Citation Format

Share Document