IJCATR Volume 3 Issue 11

Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wireless Sensor Network

S.Subha U.Gowri Sankar
10.7753/IJCATR0311.1008
keywords : Hop-by-hop authentication, public-key cryptosystem, source privacy, Modified ELGamal signature, Round Trip Time.

PDF
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method, considers the RTT between two successive nodes and those nodes’ neighbor number which is needed to compare those values of other successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance.
@artical{s3112014ijcatr03111008,
Title = "Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wireless Sensor Network",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "3",
Issue ="11",
Pages ="693 - 696",
Year = "2014",
Authors ="S.Subha U.Gowri Sankar"}
  • null