node compromise
Recently Published Documents


TOTAL DOCUMENTS

39
(FIVE YEARS 5)

H-INDEX

11
(FIVE YEARS 0)

Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3074
Author(s):  
Deepak Prashar ◽  
Mamoon Rashid ◽  
Shams Tabrez Siddiqui ◽  
Dilip Kumar ◽  
Amandeep Nagpal ◽  
...  

Localization and security are among the most dominant tasks of wireless sensor networks (WSN). For applications containing sensitive information on the location parameters of the event, secure localization is mandatory and must not be compromised at any cost. The main task, as if any node is malicious, is to authenticate nodes that are involved in the localization process. In this paper, we propose a secure hop-based algorithm that provides a better localization accuracy. In addition, to maintain the security of the localization process, the digital signature approach is used. Moreover, the impact of malicious nodes on the proposed scheme has also been observed. The proposed approach is also contrasted with the basic DV-Hop and improved DV-Hop based on error correction. From the simulation outcomes, we infer that this secure digital-signature-based localization strategy is quite robust against any node compromise attacks, thereby boosting its precision. Comparisons between the proposed algorithm and the state of the art were made on the grounds of different parameters such as the node quantity, ratio of anchor nodes, and range value towards the localization error.


Author(s):  
K Pavan Kumar Reddy Et.al

In wireless sensor networks (WSNs), energy constraint of node is the major issue, as the sensor may be deployed in the area where energy backup or quick replacements may not be available. In such cases, preserving the node energy and prolonging the network life time play crucial role in wireless sensor networks. Similarly, sensor nodes are highly vulnerable to attacks, attackers can easily tamper the sensor node and compromise it. Thus to overcome above stated two problems, the proposed work ensures shortest path routing, which ensures network life time of sensor nodes and the trust based routing, which avoids node compromise attacks. The proposed shortest path routing algorithms takes route through multi-hop nodes to corresponding sink. The shortest path based on the geographical routing strategy chooses the nodes nearest to the routing node and sink node. The novel routing framework proposed in this work considered shortest path with trust based routes. The node's energy is considered to taking reliable node on the routing path, which ensure the packet delivery and avoids any node failure due to less energy. The node's trust value is evaluated with three type, which ensure that the paths created are more reliable


Author(s):  
KUMMARI GURUDEV

Due to the increased growth of elderly people in recent years, healthcare systems face many challenges on the money spent for those people. Both quality and affordability has to be provided by the new technology which is the todays need. When applying WSN technologies, the advantages such as continuous monitoring with alert mechanisms and relative information are to be satisfied. Among the other challenges, due to the deployed environment, security is a key challenge. As gateway connects to the wireless networks, it is the target area for many adversaries to launch various attacks. Initially, attacker launches node compromise attack which leads to node replication attack.


2016 ◽  
Vol 2016 ◽  
pp. 1-15
Author(s):  
AtaUllah Ghafoor ◽  
Muhammad Sher ◽  
Muhammad Imran ◽  
Imran Baig

Key distribution is essential for providing secure communication between commercial and sensitive applications of wireless sensor and actor networks (WSANs). It becomes more challenging when any of the intermediate sensor nodes is compromised by the adversaries as the messages carrying secure keys will be exposed and links will be unreliable. This paper presents a Disjoint Key Establishment Protocol (DKEP) that does not require transmitting keys across the nodes. In DKEP, each node is preloaded with one row and one column from a matrix. After the deployment, indices for row and column are exchanged between the two nodes and values at intersection of row and column index will be used to calculate the key on each node. DKEP is verified by performing formal analysis using Rubin Logic and validated using simulations in NS-2. Simulation results demonstrate the effectiveness and efficiency of DKEP compared to contemporary schemes in terms of reducing storage and communication cost and improving resilience against node compromise attacks. Moreover, the proposed scheme is implemented in a group-based mobile application scenario for secure message exchange.


IEEE Access ◽  
2016 ◽  
Vol 4 ◽  
pp. 4183-4206 ◽  
Author(s):  
Ahmed Al-Riyami ◽  
Ning Zhang ◽  
John Keane

Sign in / Sign up

Export Citation Format

Share Document