Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN

被引:0
|
作者
Nivedha, T. [1 ]
Jayanthi, K. [1 ]
机构
[1] Pondicherry Engn Coll, Dept Elect & Commun Engn, Pondicherry, India
关键词
Eavesdropper; Clustering; Digital Signature (DS); Additive Homomorphic Encryption (AHE);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In Wireless Sensor Network (WSN) transmitting the data is common but protecting the transferred information is more important. For example, in military surveillance scenario, an attacker may observe the sensor data moving from source to the sink and could identify the sink node location and may acquire the data directly. Under such circumstances, providing security and authentication is very essential. The objective of the work is to eliminate different attackers using aggregate signature scheme and provide security and authentication using Digital Signature (DS) and Additive Homomorphic Encryption (AHE) scheme. In this proposed work, the sink node (base station) broadcast hello message to sensor nodes for evaluating the node energy and distance and then clustering process is activated for Cluster head selection. Sink node generates the key for digital signature using the SHA1 algorithm and verifies the signature by using DSA verification code. AHE is added for secure transfer of data from Cluster head to sink node and also authentication is done between cluster head and nodes. Malicious nodes are added to the network to absorb the packets and to mimic a threat scenario. The performance metrics like Communication overhead, Energy consumption, and Packet delivery rate are analyzed from the obtained results and they are found to be better than the performance of the existing work.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
    Siasi, Nazli
    Aldalbahi, Adel
    Jasim, Mohammed A.
    2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [32] On a security scheme against collusive attacks in vehicular ad hoc networks
    Fan, Na
    Wu, Chase
    Benabdallah, Slimane
    Li, Jialong
    Gao, Yuxin
    Wang, Qinglong
    VEHICULAR COMMUNICATIONS, 2024, 49
  • [33] A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS
    GOLDWASSER, S
    MICALI, S
    RIVEST, RL
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 281 - 308
  • [34] Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks
    Bulygin, Stanislav
    Petzoldt, Albrecht
    Buchmann, Johannes
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 17 - +
  • [35] Improving circuit security against power analysis attacks with subthreshold operation
    Alstad, Havard Pedersen
    Aunet, Snorre
    2008 IEEE WORKSHOP ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS AND SYSTEMS, PROCEEDINGS, 2008, : 12 - +
  • [36] Improving security of lightweith SHA-3 against preimage attacks
    Onopa, Serhii
    Kotulski, Zbigniew
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2018, 64 (02) : 159 - 166
  • [37] On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks
    Yan, Zhen
    Qu, Haipeng
    Lin, Xi-Jun
    COMPUTER JOURNAL, 2024, 67 (09): : 2819 - 2822
  • [38] A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model
    Li, Xincheng
    Zhou, Lifeng
    Yin, Xinchun
    Ning, Jianting
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10865 - 10879
  • [39] An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things
    Qiao, Zirui
    Yang, Qiliang
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Wang, Tao
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 72 - 82
  • [40] A group-oriented (t, n) threshold signature scheme against replay attacks
    Chang, Chin-Chen
    Chen, Kuo-Lun
    Lin, Chu-Hsing
    Chang, Jen-Chieh
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2006, 4159 : 816 - 825