A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is important in...
Saved in:
Published in | 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science pp. 1 - 5 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.03.2014
|
Subjects | |
Online Access | Get full text |
ISBN | 9781479925254 147992525X |
DOI | 10.1109/SCEECS.2014.6804514 |
Cover
Loading…
Abstract | Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this paper, we try to explore security issue in WSN. First, the constraints, security requirements and attacks with their corresponding countermeasures in WSNs are explained. Individual sensor nodes are subject to compromised security. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a Gray hole by compromised nodes. If these two kinds of attacks occur simultaneously in a network, some of the existing methods fail to defend against those attacks. The Ad-hoc On Demand Distance (AODV) Vector scheme for detecting Gray-Hole attack and Statistical En-Route Filtering is used for detecting false report. For increasing security level, the Elliptic Curve Cryptography (ECC) algorithm is used. Simulations results obtain so far reduces energy consumption and also provide greater network security to some extent. |
---|---|
AbstractList | Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this paper, we try to explore security issue in WSN. First, the constraints, security requirements and attacks with their corresponding countermeasures in WSNs are explained. Individual sensor nodes are subject to compromised security. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a Gray hole by compromised nodes. If these two kinds of attacks occur simultaneously in a network, some of the existing methods fail to defend against those attacks. The Ad-hoc On Demand Distance (AODV) Vector scheme for detecting Gray-Hole attack and Statistical En-Route Filtering is used for detecting false report. For increasing security level, the Elliptic Curve Cryptography (ECC) algorithm is used. Simulations results obtain so far reduces energy consumption and also provide greater network security to some extent. |
Author | Mangrulkar, R. S. Sakharkar, Sneha M. Atique, Mohammad |
Author_xml | – sequence: 1 givenname: Sneha M. surname: Sakharkar fullname: Sakharkar, Sneha M. email: snehasakharkar@gmail.com organization: Dept. of Comput. Sci. & Eng., Bapurao Deshmukh Coll. of Eng., Sevagram, India – sequence: 2 givenname: R. S. surname: Mangrulkar fullname: Mangrulkar, R. S. email: rsmangrulkar@gmail.com organization: Dept. of Comput. Eng., Bapurao Deshmukh Coll. of Eng., Sevagram, India – sequence: 3 givenname: Mohammad surname: Atique fullname: Atique, Mohammad email: mohd.atique@gmail.com organization: Post Grad. Dept..of Comput. Sci., SGBAU, Amravati, India |
BookMark | eNo1kE1OwzAQhY2ABS09QTe-QIqdOE7MrorCj1SJRbuvbGfSWE3tyHGpchHOiymwmpmnN_PpzQzdWWcBoSUlK0qJeNpWdV1tVymhbMVLwnLKbtCMskKINE95eYsWoij_55w9oK81Hs_-E6ZnHDvQZw_Yu3Mw9oBPEDrX4NZ53EAAfRVb2Y_RAoPzYcTSNvjg5ZR0rgcsQ5D6GNXeRefFhA7XfW-GYDSufii48tMQXNwYugkbGz0eehjHiLZj5FgIF-eP4yO6v4IWf3WOdi_1rnpLNh-v79V6kxhBQlK0nLQqVVICz2L-lKZMCE6UljnNVCkLaEhTcJkrSDkFXjZccUbbItM6V1k2R8vfswYA9oM3J-mn_d_nsm8182nP |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/SCEECS.2014.6804514 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1479925268 9781479925261 9781479925247 1479925241 |
EndPage | 5 |
ExternalDocumentID | 6804514 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-7f60fb2baae6310921249960bca513b8a7ed0d76a5be261e68d6b641f73cc5b33 |
IEDL.DBID | RIE |
ISBN | 9781479925254 147992525X |
IngestDate | Wed Jun 26 19:29:03 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-7f60fb2baae6310921249960bca513b8a7ed0d76a5be261e68d6b641f73cc5b33 |
PageCount | 5 |
ParticipantIDs | ieee_primary_6804514 |
PublicationCentury | 2000 |
PublicationDate | 2014-March |
PublicationDateYYYYMMDD | 2014-03-01 |
PublicationDate_xml | – month: 03 year: 2014 text: 2014-March |
PublicationDecade | 2010 |
PublicationTitle | 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science |
PublicationTitleAbbrev | SCEECS |
PublicationYear | 2014 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.5778911 |
Snippet | Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | AODV Base stations ECC Elliptic curve cryptography Protocols Routing Secure Routing Security Statistical En-Route Wireless Sensor Network Wireless sensor networks |
Title | A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks |
URI | https://ieeexplore.ieee.org/document/6804514 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60J08qVnwzB4-mTZPNJvEmoUUERahCb2UfExEllTQR6g_x9zrTpL7w4G2zLDvLZpmdnfnmGyFOdeh04OfSs87GnkwHxiMrBL1UhyrMZURak_0d1zfq8l5eTaLJmjj7zIVBxCX4DHvcXMby3czW7Crrq4TZUOS6WKeH27dcrThNgyiIJisKp_ZbtixDAz_tj7PhMBszlEv22ml-1FNZXiejTXG9WkiDInnq1ZXp2bdfHI3_XemW6H4l7sHt55W0Ldaw2BHvFzCvy1dcnAO12L-OUM5qxjtDU0AayHIFhxxP4M6cjiQNaaIJoAsHD6VeeFxJF3RVcVY-6OcZjWQvLjDsgxSPhYylQFYuXqqWCBseC2Ay5GfSpyS6mJOcogGez7vibjS8yy69thyD95j6lRfnys9NYLRGxXSiAZetpvePsToahCbRMTrfxUpHBulZhipxyig5yOPQ2siE4a7oFLMC9wQkNAdNJQMTkjWmbJI4aZDaGMTW5Mm-2OEtnb40hBvTdjcP_u4-FBv8Wxtg2JHoVGWNx2QpVOZkeUQ-ANHpv88 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwELZ4HOAECFa8mQNHUtLEcRJuKCoqj6KV6Eq9VX5MVgiUojRBKj-E38tME2BZceDmWJZtOdbMeOabb4Q41qHTgZ9LzzobezLtGo-sEPRSHaowlxFJTfZ3DG5V_4-8GkWjBXHykQuDiHPwGXa4OY_lu4mt2VV2qhJmQ5GLYpn0vkz_ydaK0zSIgmj0TuLUfsuWZ6jrp6d3Wa-X3TGYS3baib5UVJkrlIs1MXjfSoMjeejUlenYl_9YGn-613Wx9Zm6B78_lNKGWMBiU7yew7Qun3F2BtRiDztCOakZ8QxNCWkg2xUcckSBO3O6lDSkiSeALhz8LfXM41q6oKuK8_JBP05oJPtxgYEfJHosZLwKZOXsqWqpsOG-AKZDfiSJSksXU1qnaKDn0y0xvOgNs77XFmTw7lO_8uJc-bkJjNaomFA04MLV9AIyVkfd0CQ6Rue7WOnIID3MUCVOGSW7eRxaG5kw_CWWikmB2wISmoOmkoEJyR5TNkmcNEhtDGJr8mRHbPKRjp8ayo1xe5q733cfiZX-cHAzvrm8vd4Tq_yLG5jYvliqyhoPyG6ozOH8urwBC8zDHw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+IEEE+Students%27+Conference+on+Electrical%2C+Electronics+and+Computer+Science&rft.atitle=A+survey%3A+A+secure+routing+method+for+detecting+false+reports+and+gray-hole+attacks+along+with+Elliptic+Curve+Cryptography+in+wireless+sensor+networks&rft.au=Sakharkar%2C+Sneha+M.&rft.au=Mangrulkar%2C+R.+S.&rft.au=Atique%2C+Mohammad&rft.date=2014-03-01&rft.pub=IEEE&rft.isbn=9781479925254&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FSCEECS.2014.6804514&rft.externalDocID=6804514 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479925254/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479925254/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479925254/sc.gif&client=summon&freeimage=true |