An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security

被引:1
|
作者
Priyanka, R. [1 ,2 ]
Reddy, K. Satyanarayan [2 ,3 ]
机构
[1] Cambridge Inst Technol, Dept Informat Sci & Engn, Bangalore, Karnataka, India
[2] VTU, Belagavi, India
[3] Cambridge Inst Technol, North Campus Bangalore, Bangalore, Karnataka, India
关键词
WSN; Security; Localization; ECDH; RSA; Cryptography; ROUTING ALGORITHM; EFFICIENT;
D O I
10.14456/ITJEMAST.2022.140
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The demand for sensor Network-based communication has increased due to its wide range of applications. Reliability of data collection is a challenging task in these networks. There are two concerns about sensor placement. First, attackers may target the localization process to manipulate estimated positions. Second, because sensor nodes may get hacked, Base Station (BS) might not be able to trust the positions provided by sensor nodes. Researchers have proposed two techniques to address these two issues: secure localization and location verification. Routing in WSN is considered because it facilitates the transmission of data from any source node to the destinated nodes. Routing attacks have the potential to disrupt and degrade WSN functionality. Numerous experiments, including cryptographic approaches and centralized routing, have been done to enhance confidence between routing nodes. However, the generally utilized message transmission approaches are unsuitable in reality because of the difficulties they face in accurately recognizing hostile node activity. This study focuses on introducing a combined method where secure node localization, node authentication, and secure data exchange via cryptography are presented. The comparative analysis shows that the proposed approach can prevent a greater number of internal and external attacks when compared with state-of-art techniques. (C) 2022 INT TRANS J ENG MANAG SCI TECH.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Improved End-to-End Data Security Approach for Cloud Computing
    Ghosh, Soumalya
    Verma, Shiv Kumar
    Ghosh, Uttam
    Al-Numay, Mohammed
    [J]. SUSTAINABILITY, 2023, 15 (22)
  • [2] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [3] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [4] An end-to-end hardware approach security for the GPRS
    Kitsos, P
    Sklavos, N
    Koufopavlou, O
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 791 - 794
  • [5] Information security on the logistical network: An end-to-end approach
    Beck, M
    Plank, JS
    Millar, J
    Atchley, S
    Soltesz, S
    Bassi, A
    Liu, HD
    [J]. SECOND IEEE INTERNATIONAL SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2004, : 31 - 37
  • [6] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [7] An End-to-End Security Approach for Digital Document Management
    Diego Munoz-Hernandez, Mario
    Morales-Sandoval, Miguel
    Juan Garcia-Hernandez, Jose
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1076 - 1090
  • [8] End-to-End Security Methods for UDT Data Transmissions
    Bernardo, Danilo Valeros
    Hoang, Doan B.
    [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393
  • [9] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [10] Embedded end-to-end wireless security with ECDH key exchange
    Kumar, S
    Girimondo, M
    Weimerskirch, A
    Paar, C
    Patel, A
    Wander, AS
    [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 786 - 789