Efficient Security Authentication Protocol in Wireless Sensor Networks

Article Preview

Abstract:

Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).

You might also be interested in these eBooks

Info:

Periodical:

Pages:

418-423

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sudip Misra, Ashim Ghosh, A.P. Sagar p, Mohammad S. Obaidat, Detection of Identity Based Attacks in Wireless Sensor Networks using Signalprints", 2010 IEEE/ACM International Conference on Green Computing and Communications & 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, , pp.35-41.

DOI: 10.1109/greencom-cpscom.2010.61

Google Scholar

[2] Li Wei, Chen Ming, Li Mingming, Information Security Routing protocol in WSN, Fifth International conference on Information Assurance and security, pp.651-656, (2009).

DOI: 10.1109/ias.2009.260

Google Scholar

[3] Nisarg Gandhewar, Rahila Patel, Detection and prevention of Sinkhole Attack on AODV protocol in Mobile Adhoc Network, 2012 4th International Conference on Computational Intelligence and Communication Networks, pp.714-718.

DOI: 10.1109/cicn.2012.96

Google Scholar

[4] Laxmi Shrivastava, Sarita S. Bhadauria, G.S. Tomar, Performance Evaluation of Routing Protocols in MANET with different traffic loads, International Conference on Communication System Network Technologies IEEE (2011).

DOI: 10.1109/csnt.2011.10

Google Scholar

[5] Ndibanje Bruce, Hoon Jae Lee, A secure authentication protocol among mobile phone and wireless sensor networks, 15th International conference on Advanced communication Technology (ICACT) 2013, pp-52-59.

Google Scholar

[6] L.B. Jivanadham, A.K.M.M. Islam, N. Mansoor, s. Baharun, A secured dynamic cluster based wireless sensor network, 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, pp.223-228.

DOI: 10.1109/cicsyn.2012.49

Google Scholar

[7] Zhiqiang Du, Kun Wang, Lihua Zhou, Efficient Broadcast Authentication in Wireless Sensor Network, 2008 IEEE Asia Pacific Services Computing Conference, pp.187-192.

DOI: 10.1109/apscc.2008.133

Google Scholar

[8] Chi Huan Jiang, Hung- Lin Li, Yu-Jung Huang, Wei-Cheng Lin, Mutual Authentication Architecture in Wireless Sensor Network, 2010 Asia Pacific Conference on Post Graduate Research in Microelectronics and Electronics, pp.291-294.

DOI: 10.1109/primeasia.2010.5604905

Google Scholar

[9] Mohammad Wazid, Roshan Singh Sachan, R. H Goudar, D P Singh, Detection and Prevention Mechanism for Black Hole Attack in Wireless Sensor Network, 2013 International Conference on Communication and Signal Processing, pp.576-581.

DOI: 10.1109/iccsp.2013.6577120

Google Scholar

[10] Satria Mandala, Abdul Hanan Abdullah, Abdul Samad Ismail, Habibollah Haron, Md Asri Ngadi, Yahaya Coulibaly, A review of Black Hole Attack in Mobile Adhoc Networks, , 2013 3rd International Conference on Instrumentation, Communications, Information Technology, Biomedical Engineering, pp.339-344.

DOI: 10.1109/icici-bme.2013.6698520

Google Scholar

[11] Jaydip Sen, Sripad Koilakonda, Arijit Ukil, A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Adhoc Networks, 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation, pp.338-343.

DOI: 10.1109/isms.2011.58

Google Scholar

[12] Durgesh K Shirsagar, Ashwini Patil, Black Hole Attack Detection and Prevention by Real Time Monitoring, 2013 4th International Conference on Computing, Communications and Networking Technologies, pp.1-5.

DOI: 10.1109/icccnt.2013.6726597

Google Scholar

[13] Isaac Woungang, Sanjay Kumar Dhurendher, Rajender Dheeraj Peddi, Mohammad S. Obaidat, Detecting Black Hole Attacks on DSR based Mobile Adhoc Networks, 2012 International Conference on Computer, Information and Telecommunication Systems, pp.1-5.

DOI: 10.1109/cits.2012.6220364

Google Scholar

[14] Gundeep Singh Bindra, Ashsish Kapoor, Ashsish Narang, Arjun Agrawal, Detection and Removal of Co-operative Black Hole and Grayhole Attacks in MANETs, 2012 International Conference on System Engineering and Technology, pp.1-5.

DOI: 10.1109/icsengt.2012.6339342

Google Scholar

[15] Amit Kumar Sharma, Sunil Gupta, Rashmi, Authentication Protocol against Malicious Attack in Wireless Sensor Network, 2012 International Journal of Computer Applications, Vol 58 – No. 4, pp.29-33.

DOI: 10.5120/9272-3462

Google Scholar

[16] Li Wei, Chen Ming, Li Mingming, Information Security Routing protocol in WSN, Fifth International conference on Information Assurance and security, pp.651-656, (2009).

DOI: 10.1109/ias.2009.260

Google Scholar