scholarly journals A trust-based authentication framework for security of WPAN using network slicing

Author(s):  
Sazia Parvin ◽  
Amjad Gawanmeh ◽  
Sitalakshmi Venkatraman ◽  
Ali Alwadi ◽  
Jamal N. Al-Karaki ◽  
...  

New technologies bring along many challenges including security and privacy. Wireless personal area networks (WPANs) are characterized by limited energy resources and computing power that calls for lightweight security mechanisms in these networks as a mandatory requirement. In this paper, a lightweight trust-based framework for node authentication in WPAN is proposed. Our main objective is to minimise the effort in distinguishing valid requests of trustworthy nodes from invalid requests of malicious nodes that can result in network compromises. We achieve this through network slicing which divides the network into virtually primary and secondary networks. The proposed framework has three-fold benefits. First, it authenticates nodes’ requests based on a novel method of trust value calculation. Second, the framework maintains energy efficiency while authenticating nodes’ requests to access WPAN resources. Finally, the framework provides a solution for biasing problem that can arise due to unexpected behaviour of malicious users in WPANs. The framework efficacy is illustrated on a case study to shown how it can accurately capture trust relations among nodes while preventing malicious behavior.

2014 ◽  
Vol 519-520 ◽  
pp. 155-159
Author(s):  
Zhen Zhen Su ◽  
Er Kun Sun ◽  
Xiao Gang Qi ◽  
Ying Nie ◽  
Wei Hong Lin ◽  
...  

Based on previous research, this paper puts forward a kind of routing protocol based on node convergence degree and the trust value which named BCDTV. We focus on algorithm design and work process, including the election of cluster head and the establishment of cluster, the collection and transmission of the information. We use the gradational design algorithm when calculation the trust of every nodes. Simulation results show that the protocol can prevent some malicious behavior of malicious nodes effectively.


2009 ◽  
Vol E92-B (1) ◽  
pp. 143-149
Author(s):  
Sen-Hung WANG ◽  
Chih-Peng LI ◽  
Chao-Tang YU ◽  
Jian-Ming HUANG ◽  
Chua-Chin WANG

2018 ◽  
Vol 11 (1) ◽  
pp. 78 ◽  
Author(s):  
Yasmin M. Amin ◽  
Amr T. Abdel-Hamid

The IEEE 802.15.4 standard defines the PHY and MAC layer specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). With the proliferation of many time-critical applications with real-time delivery, low latency, and/or specific bandwidth requirements, Guaranteed Time Slots (GTS) are increasingly being used for reliable contention-free data transmission by nodes within beacon-enabled WPANs. To evaluate the performance of the 802.15.4 GTS management scheme, this paper introduces a new GTS simulation model for OMNeT++ / MiXiM. Our GTS model considers star-topology WPANs within the 2.4 GHz frequency band, and is in full conformance with the IEEE 802.15.4 – 2006 standard. To enable thorough investigation of the behaviors and impacts of different attacks against the 802.15.4 GTS mechanism, a new GTS attacks simulation model for OMNeT++ is also introduced in this paper. Our GTS attacks model is developed for OMNeT++ / NETA, and is integrated with our GTS model to provide a single inclusive OMNeT++ simulation model for both the GTS mechanism and all known-to-date attacks against it.


2006 ◽  
Vol 5 (10) ◽  
pp. 1361-1373 ◽  
Author(s):  
Jianliang Zheng ◽  
M.J. Lee ◽  
M. Anshel

2016 ◽  
Vol 110 ◽  
pp. 58-68
Author(s):  
Yu Wang ◽  
Mehul Motani ◽  
Hari Krishna Garg ◽  
Xin Kang ◽  
Qian Chen

Sign in / Sign up

Export Citation Format

Share Document