3.8 Article

Secure node ID assignment for internet integrated sensor network

Journal

Publisher

INDERSCIENCE ENTERPRISES LTD

Keywords

ID based attacks; public key cryptography; Sybil attack; internet integrated WSN

Ask authors/readers for more resources

Internet integrating sensor network has experienced significant growth and is widely used in various critical sectors. This paper proposes a secure identity assignment method to defend against ID based attacks by assigning overlay ID to new nodes with the help of existing nodes. The complexity and communication overhead analysis demonstrate the effectiveness and superiority of the proposed method, which reduces message transfer by 33.33% and computation cost by approximately 70% compared to the existing approach.
Internet integrating sensor network (IISN) has gained much importance and exponential growth has been seen over the last 20 years. It is typically installed in remote and unattended terrains to monitor, process and collect time-critical and sensitive data. Internet integrated wireless sensor network can be used in various critical sectors such as monitoring of nuclear power plant, disaster management, internet of things (IoT), industrial management etc. As the application area of sensor network is increasing rapidly, the adversaries can trigger duplicate ID based attacks such as Clone and Sybil attacks. In this paper, for joining a new node in the existing network, we propose a secure identity assignment who wishes to join the network with the help of any existing node of the network. With the collaboration of an existing node, an overlay ID will be assigned to new node which is secured by using a public key cryptography. The paper included a complexity and communication overhead analysis to demonstrate the effectiveness of proposed method which maximises the defence/protection against ID based attacks. Complexity analysis demonstrates the superiority of the proposed method. The proposed approach takes 33.33% less message transfer and approximate 70% less computation cost than compared approach.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available