Enhancing security using digital signature in an efficient Network Coding-enabled WSN

被引:1
|
作者
Rhim, Hana [1 ]
Tamine, Karim [2 ]
Abassi, Ryma [1 ]
Sauveron, Damien [2 ]
Guemara, Sihem [1 ]
机构
[1] Univ Carthage, Digital Secur Lab, SupCom, Carthage, Tunisia
[2] Univ Limoges, UMR CNRS 7252, MathIS, XLIM, Limoges, France
关键词
Network coding; Digital signature; Wireless sensor networks; data integrity; Man in the middle attack; security; authentication;
D O I
10.1109/SSD52085.2021.9429522
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSNs) are ad hoc networks composed mainly of tiny and resource-constrained sensor nodes, and are rapidly growing as a technology for low-cost, large-scale and automated systems to sense and monitor a different range of potential environments. Network Coding (NC) technique has been proposed for these networks for various reasons such as improving the throughput and enhancing the energy efficiency for routing protocols. Meanwhile, these networks remain prone to many types of attacks that damage the safety and reliability of data routing. One type of attack is the Man In The Middle (MITM) attack, where an external node injects false data packet in the network or forges an intercepted one circulating between two legitimate nodes. The objective of the work is to eliminate false data packets reception at the base station (BS) and to provide data integrity using a digital signature scheme. The main advantage is the integration of the signature scheme in a moderated NC-based protocol and the use of already deployed node parameters to create private keys for sensor nodes. Simultaneously, the protocol exploits the hierarchical network organization and sets a cooperation between nodes in a cluster and their cluster head (CH) to minimize energy depletion.
引用
收藏
页码:70 / 78
页数:9
相关论文
共 50 条
  • [1] Hybrid services efficient provisioning over the network coding-enabled elastic optical networks
    Wang, Xin
    Gu, Rentao
    Ji, Yuefeng
    Kavehrad, Mohsen
    OPTICAL ENGINEERING, 2017, 56 (03)
  • [2] Enhancing the Security in Signature Verification for WSN with Cryptographic Algorithm
    Jasmin, U.
    Velayutham, R.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1584 - 1588
  • [3] On the Performance Analysis of IDLP and SpaceMac for Network Coding-Enabled Mobile Small Cells
    Parsamehr, Reza
    Mantas, Georgios
    Rodriguez, Jonathan
    Martinez-Ortega, Jose-Fernan
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (02) : 407 - 411
  • [4] IDLP: An Efficient Intrusion Detection and Location-Aware Prevention Mechanism for Network Coding-Enabled Mobile Small Cells
    Parsamehr, Reza
    Mantas, Georgios
    Rodriguez, Jonathan
    Martinez-Ortega, Jose-Fernan
    IEEE ACCESS, 2020, 8 (08): : 43863 - 43875
  • [5] SEEMd -Security Enabled Energy Efficient Middleware for WSN
    Tharakan, Linoy A.
    Dhanasekaran, R.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 800 - 804
  • [6] A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells
    Parsamehr, Reza
    Esfahani, Alireza
    Mantas, Georgios
    Radwan, Ayman
    Mumtaz, Shahid
    Rodriguez, Jonathan
    Martinez-Ortega, Jose-Fernan
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2019, 6 (06): : 1467 - 1477
  • [7] A Location-aware IDPS scheme for Network Coding-enabled Mobile Small Cells
    Parsamehr, Reza
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Martinez-Ortega, Jose-Fernan
    2019 IEEE 2ND 5G WORLD FORUM (5GWF), 2019, : 91 - 96
  • [8] Trade-Offs in Reliability, Latency, and Energy for Random Network Coding-Enabled Networks
    Shang, Bodong
    Liu, Lingjia
    Song, Hao
    Xu, Bowen
    Pudlewski, Scott
    Bentley, Elizabeth Serena
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (08) : 2768 - 2772
  • [9] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Neves, Jose Carlos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 627 - 639
  • [10] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Alireza Esfahani
    Georgios Mantas
    Jonathan Rodriguez
    José Carlos Neves
    International Journal of Information Security, 2017, 16 : 627 - 639