Enhancing security using digital signature in an efficient Network Coding-enabled WSN

被引:1
|
作者
Rhim, Hana [1 ]
Tamine, Karim [2 ]
Abassi, Ryma [1 ]
Sauveron, Damien [2 ]
Guemara, Sihem [1 ]
机构
[1] Univ Carthage, Digital Secur Lab, SupCom, Carthage, Tunisia
[2] Univ Limoges, UMR CNRS 7252, MathIS, XLIM, Limoges, France
关键词
Network coding; Digital signature; Wireless sensor networks; data integrity; Man in the middle attack; security; authentication;
D O I
10.1109/SSD52085.2021.9429522
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSNs) are ad hoc networks composed mainly of tiny and resource-constrained sensor nodes, and are rapidly growing as a technology for low-cost, large-scale and automated systems to sense and monitor a different range of potential environments. Network Coding (NC) technique has been proposed for these networks for various reasons such as improving the throughput and enhancing the energy efficiency for routing protocols. Meanwhile, these networks remain prone to many types of attacks that damage the safety and reliability of data routing. One type of attack is the Man In The Middle (MITM) attack, where an external node injects false data packet in the network or forges an intercepted one circulating between two legitimate nodes. The objective of the work is to eliminate false data packets reception at the base station (BS) and to provide data integrity using a digital signature scheme. The main advantage is the integration of the signature scheme in a moderated NC-based protocol and the use of already deployed node parameters to create private keys for sensor nodes. Simultaneously, the protocol exploits the hierarchical network organization and sets a cooperation between nodes in a cluster and their cluster head (CH) to minimize energy depletion.
引用
收藏
页码:70 / 78
页数:9
相关论文
共 50 条
  • [31] Digital Signature Technology Research of Distance Education Network Security Authentication
    Wei Wenshan
    Meng Xianxiao
    Li Haihua
    MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 831 - 836
  • [32] Efficient Load Balance Data Aggregation Methods for WSN Based on Compressive Network Coding
    Li, Yunhe
    Yang, Zhihua
    Zhang, Qinyu
    2016 IEEE INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION AND COMMUNICATION TECHNOLOGY ICEICT 2016 PROCEEDINGS, 2016, : 111 - 115
  • [33] Advanced Biometric Web Security System using Digital Signature
    Mathew, Sheryl
    Saranya, G.
    2017 IEEE INTERNATIONAL CONFERENCE ON INNOVATIONS IN GREEN ENERGY AND HEALTHCARE TECHNOLOGIES (IGEHT), 2017,
  • [34] On Security Against Pollution Attacks in Network Coding Enabled 5G Networks
    Vasudevan, Vipindev Adat
    Tselios, Christos
    Politis, Ilias
    IEEE ACCESS, 2020, 8 : 38416 - 38437
  • [35] On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme
    Ji, Yanyan
    Chang, Jinyong
    Dai, Honglong
    Xu, Maozhi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (12): : 2477 - 2480
  • [36] An efficient dynamic-identity based signature scheme for secure network coding
    Jiang, Yixin
    Zhu, Haojin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    COMPUTER NETWORKS, 2010, 54 (01) : 28 - 40
  • [37] Anomaly detection for network servers using digital signature of network segment
    Proença, ML
    Zarpelao, BB
    Mendes, LS
    Telecommunications 2005, Proceedings, 2005, : 290 - 295
  • [38] Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN’s
    Ankita Srivastava
    Pramod Kumar Mishra
    Peer-to-Peer Networking and Applications, 2022, 15 : 2670 - 2693
  • [39] Proposal of digital forensic system using security device and hysteresis signature
    Ashino, Yuki
    Sasaki, Ryoichi
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 3 - 7
  • [40] Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN's
    Srivastava, Ankita
    Mishra, Pramod Kumar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (06) : 2670 - 2693