Reinstate Authentication of Nodes in Sensor Network

Reinstate Authentication of Nodes in Sensor Network

Ambika N.
Copyright: © 2020 |Pages: 18
DOI: 10.4018/978-1-7998-4381-8.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Transmitting data using the wireless medium provides a greater opportunity for the adversary to introduce different kinds of attacks into the network. Securing these monitoring devices deployed in unattended environments is a challenging task for the investigator. One of the preliminary practices adopted to ensure security is authentication. The chapter uses a new authentication procedure to evaluate the nodes. It uses sensors of a different caliber. Static and mobile nodes are used to bring the thought into play. The mobile nodes in the network demand vigorous defense mechanisms. The chapter defines a new authentication algorithm engaging itself to validate the communicating parties. The work is devised to substitute new nodes into the cluster to foster prolonged working of the network. By adopting the proposed protocol, backward and forward secrecy is preserved in the network. The work assures the security of the nodes by minimizing forge and replay attacks.
Chapter Preview
Top

Review Of The Previous Work

Verifying the identity of the communicating parties becomes essential before transmitting the confidential data. The previous works suggested by various authors focus on either one-way, mutual authentication or reliability by considering the acknowledgment sent by the sink node. This section details the work proposed by various authors.

In (Wong, Zheng, Cao, & Wang, 2006) the environment is divided into different zones. Any mobile user is an authorized user to access data from the sensors. The user is to register with the gateway by its name and password before communicating with the sensors. After registration, the user is provided a time to do his queries. During the procedure, the user is supposed to be stationary, login to the sensor login-node, query them and wait for the result. The procedure has to be repeated if the user has any more queries for the sensors. The scheme fails to provide security against replay and forgery attacks.

Complete Chapter List

Search this Book:
Reset