Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN

被引:0
|
作者
Nivedha, T. [1 ]
Jayanthi, K. [1 ]
机构
[1] Pondicherry Engn Coll, Dept Elect & Commun Engn, Pondicherry, India
关键词
Eavesdropper; Clustering; Digital Signature (DS); Additive Homomorphic Encryption (AHE);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In Wireless Sensor Network (WSN) transmitting the data is common but protecting the transferred information is more important. For example, in military surveillance scenario, an attacker may observe the sensor data moving from source to the sink and could identify the sink node location and may acquire the data directly. Under such circumstances, providing security and authentication is very essential. The objective of the work is to eliminate different attackers using aggregate signature scheme and provide security and authentication using Digital Signature (DS) and Additive Homomorphic Encryption (AHE) scheme. In this proposed work, the sink node (base station) broadcast hello message to sensor nodes for evaluating the node energy and distance and then clustering process is activated for Cluster head selection. Sink node generates the key for digital signature using the SHA1 algorithm and verifies the signature by using DSA verification code. AHE is added for secure transfer of data from Cluster head to sink node and also authentication is done between cluster head and nodes. Malicious nodes are added to the network to absorb the packets and to mimic a threat scenario. The performance metrics like Communication overhead, Energy consumption, and Packet delivery rate are analyzed from the obtained results and they are found to be better than the performance of the existing work.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] A self-checking signature scheme for checking backdoor security attacks in Internet
    Abdulla, MF
    Ravikumar, CP
    JOURNAL OF HIGH SPEED NETWORKS, 2004, 13 (04) : 309 - 317
  • [22] A self-checking signature scheme for checking backdoor security attacks in Internet
    Department of Computer Science, University of Yemen, Yemen
    不详
    1600, 309-317 (2004):
  • [23] IoT Security Attacks Using Reverse Engineering Methods On WSN Applications
    Tellez, Mauricio
    El-Tawab, Samy
    Heydari, M. Hossain
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 182 - 187
  • [24] Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme
    Tezuka, Masayuki
    Tanaka, Keisuke
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 225 - 243
  • [25] Improving the Security Bounds against Differential Attacks for Pholkos Family
    Takeuchi, Nobuyuki
    Sakamoto, Kosei
    Shiraya, Takuro
    Isobe, Takanori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (08) : 1196 - 1204
  • [26] Improving the security of arbitrated quantum signature against the forgery attack
    Zhang, Ke-Jia
    Zhang, Wei-Wei
    Li, Dan
    QUANTUM INFORMATION PROCESSING, 2013, 12 (08) : 2655 - 2669
  • [27] Improving the security of arbitrated quantum signature against the forgery attack
    Ke-Jia Zhang
    Wei-Wei Zhang
    Dan Li
    Quantum Information Processing, 2013, 12 : 2655 - 2669
  • [28] Security Analysis and Improvement of Certificateless Aggregate Signature Scheme for Vehicular Ad Hoc Networks
    Yang Xiaodong
    Ma Tingchun
    Chen Chunlin
    Wang Jinli
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (05) : 1265 - 1270
  • [29] Certificateless Aggregate Signature Scheme With Security Proofs in the Standard Model Suitable for Internet of Vehicles
    Deng, Lunzhi
    Wen, Jian
    Gao, Yan
    Wang, Na
    Huang, Huawei
    Li, Siwei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (17): : 28765 - 28773
  • [30] Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model
    Shen, Limin
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Hai
    IET INFORMATION SECURITY, 2019, 13 (03) : 167 - 173