Enhancing security using digital signature in an efficient Network Coding-enabled WSN

被引:1
|
作者
Rhim, Hana [1 ]
Tamine, Karim [2 ]
Abassi, Ryma [1 ]
Sauveron, Damien [2 ]
Guemara, Sihem [1 ]
机构
[1] Univ Carthage, Digital Secur Lab, SupCom, Carthage, Tunisia
[2] Univ Limoges, UMR CNRS 7252, MathIS, XLIM, Limoges, France
关键词
Network coding; Digital signature; Wireless sensor networks; data integrity; Man in the middle attack; security; authentication;
D O I
10.1109/SSD52085.2021.9429522
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSNs) are ad hoc networks composed mainly of tiny and resource-constrained sensor nodes, and are rapidly growing as a technology for low-cost, large-scale and automated systems to sense and monitor a different range of potential environments. Network Coding (NC) technique has been proposed for these networks for various reasons such as improving the throughput and enhancing the energy efficiency for routing protocols. Meanwhile, these networks remain prone to many types of attacks that damage the safety and reliability of data routing. One type of attack is the Man In The Middle (MITM) attack, where an external node injects false data packet in the network or forges an intercepted one circulating between two legitimate nodes. The objective of the work is to eliminate false data packets reception at the base station (BS) and to provide data integrity using a digital signature scheme. The main advantage is the integration of the signature scheme in a moderated NC-based protocol and the use of already deployed node parameters to create private keys for sensor nodes. Simultaneously, the protocol exploits the hierarchical network organization and sets a cooperation between nodes in a cluster and their cluster head (CH) to minimize energy depletion.
引用
收藏
页码:70 / 78
页数:9
相关论文
共 50 条
  • [21] Generating Digital Signature Using DNA Coding
    Madhulika, Gadang
    Rao, Chinta Seshadri
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 21 - 28
  • [22] Optimal Packet Size Analysis for Network Coding-Enabled Two-Hop Error-Prone Wireless Networks
    Cui, Hao
    Zhang, Baoxian
    Yan, Yan
    Li, Cheng
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (05) : 904 - 908
  • [23] A lightweight security framework for network coding enabled mobile small cells
    Adat, Vipindev
    Politis, Ilias
    Kotsopoulos, Stavros
    2020 IEEE 25TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2020,
  • [24] Efficient multiple sources network coding signature in the standard model
    Zhang, Jinlin
    Shao, Jun
    Ling, Yun
    Ji, Min
    Wei, Guiyi
    Ying, Bishan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (10): : 2616 - 2636
  • [25] EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain
    Sharma, Pratima
    Namasudra, Suyel
    Crespo, Ruben Gonzalez
    Parra-Fuente, Javier
    Trivedi, Munesh Chandra
    INFORMATION SCIENCES, 2023, 629 : 703 - 718
  • [26] Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN
    Nivedha, T.
    Jayanthi, K.
    2018 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2018,
  • [27] Efficient broadcasting using network coding
    Fragouli, Christina
    Widmer, Joerg
    Le Boudec, Jean-Yves
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (02) : 450 - 463
  • [28] An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
    Zhang, Yudi
    Jiang, Yan
    Li, Bingbing
    Zhang, Mingwu
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 524 - 531
  • [29] Distributed Trusted Authority-based Key Management for Beyond 5G Network Coding-enabled Mobile Small Cells
    de Ree, Marcus
    Mantas, Georgios
    Rodriguez, Jonathan
    Otung, Ifiok E.
    2019 IEEE 2ND 5G WORLD FORUM (5GWF), 2019, : 80 - 85
  • [30] An Efficient Lightweight Security Algorithm for Random Linear Network Coding
    Noura, Hassan
    Martin, Steven
    Al Agha, Khaldoun
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 171 - 177