DocumentCode :
3126937
Title :
Designing a secure architecture against wormhole attacks in wireless sensor networks
Author :
Jigalur, Rohit S. ; Suresha ; Bhushan, C.
Author_Institution :
Dept. of CSE, REVA ITM, Bangalore, India
fYear :
2013
fDate :
4-6 July 2013
Firstpage :
1
Lastpage :
6
Abstract :
The dynamic nature of the Wireless Sensor Networks (WSNs) brought a great deal of challenges in preserving privacy of data or security of data where there exists a sets of malicious nodes with the regular nodes in the network where malicious nodes are harmful for the network and might destroy the network. And multiple nodes might be present to cooperate for providing services like data forwarding or packet forwarding to other nodes in the network. The attacker may try to reveal the data from the network. In recent epoch of modern communication, as the communication of information might be secret records, confidential messages or may be in digitized form like e-cheques, scanned certificates etc., these data has to be sent to desired destination with confidentiality. In this research work, we propose a secure architecture for monitoring of data in WSNs by preserving privacy of data i.e. secure architecture for routing of data by using digital signature against wormhole attack. We use a secret key mechanism where the secret key will be known to the sender and a receiver. The data will be encrypted by source and decrypted using secret key in the destination and all the nodes in the network must be registered with Trusted Authority (TA), and the data will be monitored in each node and it follows hop-by-hop transmission. The Advanced Encryption Standard (AES) scheme is used to strengthen the confidentiality and integrity of the data. The proposed work is simulated in Java and the results obtained using routing tables are shown.
Keywords :
data privacy; digital signatures; private key cryptography; security of data; telecommunication network routing; wireless sensor networks; AES; Java; advanced encryption standard; data forwarding; data privacy; digital signature; hop-by-hop transmission; malicious nodes; packet forwarding; routing tables; secret key mechanism; secure architecture; security of data; trusted authority; Data privacy; Encryption; Monitoring; Routing; Sensors; Wireless sensor networks; AES; Privacy; Secret key; WSN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
Type :
conf
DOI :
10.1109/ICCCNT.2013.6726768
Filename :
6726768
Link To Document :
بازگشت