Enhancing security using digital signature in an efficient Network Coding-enabled WSN

被引:1
|
作者
Rhim, Hana [1 ]
Tamine, Karim [2 ]
Abassi, Ryma [1 ]
Sauveron, Damien [2 ]
Guemara, Sihem [1 ]
机构
[1] Univ Carthage, Digital Secur Lab, SupCom, Carthage, Tunisia
[2] Univ Limoges, UMR CNRS 7252, MathIS, XLIM, Limoges, France
关键词
Network coding; Digital signature; Wireless sensor networks; data integrity; Man in the middle attack; security; authentication;
D O I
10.1109/SSD52085.2021.9429522
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSNs) are ad hoc networks composed mainly of tiny and resource-constrained sensor nodes, and are rapidly growing as a technology for low-cost, large-scale and automated systems to sense and monitor a different range of potential environments. Network Coding (NC) technique has been proposed for these networks for various reasons such as improving the throughput and enhancing the energy efficiency for routing protocols. Meanwhile, these networks remain prone to many types of attacks that damage the safety and reliability of data routing. One type of attack is the Man In The Middle (MITM) attack, where an external node injects false data packet in the network or forges an intercepted one circulating between two legitimate nodes. The objective of the work is to eliminate false data packets reception at the base station (BS) and to provide data integrity using a digital signature scheme. The main advantage is the integration of the signature scheme in a moderated NC-based protocol and the use of already deployed node parameters to create private keys for sensor nodes. Simultaneously, the protocol exploits the hierarchical network organization and sets a cooperation between nodes in a cluster and their cluster head (CH) to minimize energy depletion.
引用
收藏
页码:70 / 78
页数:9
相关论文
共 50 条
  • [41] An efficient signature-based scheme for securing network coding against pollution attacks
    Yu, Zhen
    Wei, Yawen
    Ramkumar, Bhuvaneswari
    Guan, Yong
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 2083 - 2091
  • [42] A digital signature algorithm in information and network security based on discrete logarithm and hash functions
    Qu, Peixin
    Liu, Zhen
    Journal of Convergence Information Technology, 2012, 7 (20) : 557 - 564
  • [43] Enhancing Physical-Layer Security in LEO Satellite-Enabled IoT Network Communications
    Talgat, Anna
    Wang, Ruibo
    Kishk, Mustafa A.
    Alouini, Mohamed-Slim
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33967 - 33979
  • [44] Digital signature to help network management using flow analysis
    Proenca, Mario Lemes, Jr.
    Fernandes, Gilberto, Jr.
    Carvalho, Luiz F.
    de Assis, Marcos V. O.
    Rodrigues, Joel J. P. C.
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2016, 26 (02) : 76 - 94
  • [45] Energy Efficient Core Networks Using Network Coding
    Musa, Mohamed O. I.
    El-Gorashi, Taisir E. H.
    Elmirghani, Jaafar M. H.
    2015 17th International Conference on Transparent Optical Networks (ICTON), 2015,
  • [46] Efficient Multicast in Wireless Networks Using Network Coding
    Wang, Wendie
    Jia, Guozhu
    Wei, Menhang
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION PROBLEM-SOLVING (ICCP), 2015, : 126 - 129
  • [47] Efficient Broadcasting in Parallel Networks Using Network Coding
    Rakesh, Nitin
    Tyagi, Vipin
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 484 - +
  • [48] Digital Signature Model of Sensor Network Using Hash Chain
    Kim, Young-Soo
    Sun, Ning
    Lee, Sang-Ho
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 2, 2010, : 543 - 546
  • [50] PROVIDING NETWORK SECURITY BY USING THE STEGANOGRAPHY ON DIGITAL IMAGES
    Ergun, Fulden
    Kirsal Ever, Yoney
    2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 360 - 364