A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks

Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is important in...

Full description

Saved in:
Bibliographic Details
Published in2014 IEEE Students' Conference on Electrical, Electronics and Computer Science pp. 1 - 5
Main Authors Sakharkar, Sneha M., Mangrulkar, R. S., Atique, Mohammad
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.03.2014
Subjects
Online AccessGet full text
ISBN9781479925254
147992525X
DOI10.1109/SCEECS.2014.6804514

Cover

Loading…
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this paper, we try to explore security issue in WSN. First, the constraints, security requirements and attacks with their corresponding countermeasures in WSNs are explained. Individual sensor nodes are subject to compromised security. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a Gray hole by compromised nodes. If these two kinds of attacks occur simultaneously in a network, some of the existing methods fail to defend against those attacks. The Ad-hoc On Demand Distance (AODV) Vector scheme for detecting Gray-Hole attack and Statistical En-Route Filtering is used for detecting false report. For increasing security level, the Elliptic Curve Cryptography (ECC) algorithm is used. Simulations results obtain so far reduces energy consumption and also provide greater network security to some extent.
AbstractList Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this paper, we try to explore security issue in WSN. First, the constraints, security requirements and attacks with their corresponding countermeasures in WSNs are explained. Individual sensor nodes are subject to compromised security. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a Gray hole by compromised nodes. If these two kinds of attacks occur simultaneously in a network, some of the existing methods fail to defend against those attacks. The Ad-hoc On Demand Distance (AODV) Vector scheme for detecting Gray-Hole attack and Statistical En-Route Filtering is used for detecting false report. For increasing security level, the Elliptic Curve Cryptography (ECC) algorithm is used. Simulations results obtain so far reduces energy consumption and also provide greater network security to some extent.
Author Mangrulkar, R. S.
Sakharkar, Sneha M.
Atique, Mohammad
Author_xml – sequence: 1
  givenname: Sneha M.
  surname: Sakharkar
  fullname: Sakharkar, Sneha M.
  email: snehasakharkar@gmail.com
  organization: Dept. of Comput. Sci. & Eng., Bapurao Deshmukh Coll. of Eng., Sevagram, India
– sequence: 2
  givenname: R. S.
  surname: Mangrulkar
  fullname: Mangrulkar, R. S.
  email: rsmangrulkar@gmail.com
  organization: Dept. of Comput. Eng., Bapurao Deshmukh Coll. of Eng., Sevagram, India
– sequence: 3
  givenname: Mohammad
  surname: Atique
  fullname: Atique, Mohammad
  email: mohd.atique@gmail.com
  organization: Post Grad. Dept..of Comput. Sci., SGBAU, Amravati, India
BookMark eNo1kE1OwzAQhY2ABS09QTe-QIqdOE7MrorCj1SJRbuvbGfSWE3tyHGpchHOiymwmpmnN_PpzQzdWWcBoSUlK0qJeNpWdV1tVymhbMVLwnLKbtCMskKINE95eYsWoij_55w9oK81Hs_-E6ZnHDvQZw_Yu3Mw9oBPEDrX4NZ53EAAfRVb2Y_RAoPzYcTSNvjg5ZR0rgcsQ5D6GNXeRefFhA7XfW-GYDSufii48tMQXNwYugkbGz0eehjHiLZj5FgIF-eP4yO6v4IWf3WOdi_1rnpLNh-v79V6kxhBQlK0nLQqVVICz2L-lKZMCE6UljnNVCkLaEhTcJkrSDkFXjZccUbbItM6V1k2R8vfswYA9oM3J-mn_d_nsm8182nP
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SCEECS.2014.6804514
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1479925268
9781479925261
9781479925247
1479925241
EndPage 5
ExternalDocumentID 6804514
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-7f60fb2baae6310921249960bca513b8a7ed0d76a5be261e68d6b641f73cc5b33
IEDL.DBID RIE
ISBN 9781479925254
147992525X
IngestDate Wed Jun 26 19:29:03 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-7f60fb2baae6310921249960bca513b8a7ed0d76a5be261e68d6b641f73cc5b33
PageCount 5
ParticipantIDs ieee_primary_6804514
PublicationCentury 2000
PublicationDate 2014-March
PublicationDateYYYYMMDD 2014-03-01
PublicationDate_xml – month: 03
  year: 2014
  text: 2014-March
PublicationDecade 2010
PublicationTitle 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science
PublicationTitleAbbrev SCEECS
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.5778911
Snippet Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms AODV
Base stations
ECC
Elliptic curve cryptography
Protocols
Routing
Secure Routing
Security
Statistical En-Route
Wireless Sensor Network
Wireless sensor networks
Title A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
URI https://ieeexplore.ieee.org/document/6804514
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60J08qVnwzB4-mTZPNJvEmoUUERahCb2UfExEllTQR6g_x9zrTpL7w4G2zLDvLZpmdnfnmGyFOdeh04OfSs87GnkwHxiMrBL1UhyrMZURak_0d1zfq8l5eTaLJmjj7zIVBxCX4DHvcXMby3czW7Crrq4TZUOS6WKeH27dcrThNgyiIJisKp_ZbtixDAz_tj7PhMBszlEv22ml-1FNZXiejTXG9WkiDInnq1ZXp2bdfHI3_XemW6H4l7sHt55W0Ldaw2BHvFzCvy1dcnAO12L-OUM5qxjtDU0AayHIFhxxP4M6cjiQNaaIJoAsHD6VeeFxJF3RVcVY-6OcZjWQvLjDsgxSPhYylQFYuXqqWCBseC2Ay5GfSpyS6mJOcogGez7vibjS8yy69thyD95j6lRfnys9NYLRGxXSiAZetpvePsToahCbRMTrfxUpHBulZhipxyig5yOPQ2siE4a7oFLMC9wQkNAdNJQMTkjWmbJI4aZDaGMTW5Mm-2OEtnb40hBvTdjcP_u4-FBv8Wxtg2JHoVGWNx2QpVOZkeUQ-ANHpv88
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwELZ4HOAECFa8mQNHUtLEcRJuKCoqj6KV6Eq9VX5MVgiUojRBKj-E38tME2BZceDmWJZtOdbMeOabb4Q41qHTgZ9LzzobezLtGo-sEPRSHaowlxFJTfZ3DG5V_4-8GkWjBXHykQuDiHPwGXa4OY_lu4mt2VV2qhJmQ5GLYpn0vkz_ydaK0zSIgmj0TuLUfsuWZ6jrp6d3Wa-X3TGYS3baib5UVJkrlIs1MXjfSoMjeejUlenYl_9YGn-613Wx9Zm6B78_lNKGWMBiU7yew7Qun3F2BtRiDztCOakZ8QxNCWkg2xUcckSBO3O6lDSkiSeALhz8LfXM41q6oKuK8_JBP05oJPtxgYEfJHosZLwKZOXsqWqpsOG-AKZDfiSJSksXU1qnaKDn0y0xvOgNs77XFmTw7lO_8uJc-bkJjNaomFA04MLV9AIyVkfd0CQ6Rue7WOnIID3MUCVOGSW7eRxaG5kw_CWWikmB2wISmoOmkoEJyR5TNkmcNEhtDGJr8mRHbPKRjp8ayo1xe5q733cfiZX-cHAzvrm8vd4Tq_yLG5jYvliqyhoPyG6ozOH8urwBC8zDHw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+IEEE+Students%27+Conference+on+Electrical%2C+Electronics+and+Computer+Science&rft.atitle=A+survey%3A+A+secure+routing+method+for+detecting+false+reports+and+gray-hole+attacks+along+with+Elliptic+Curve+Cryptography+in+wireless+sensor+networks&rft.au=Sakharkar%2C+Sneha+M.&rft.au=Mangrulkar%2C+R.+S.&rft.au=Atique%2C+Mohammad&rft.date=2014-03-01&rft.pub=IEEE&rft.isbn=9781479925254&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FSCEECS.2014.6804514&rft.externalDocID=6804514
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479925254/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479925254/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781479925254/sc.gif&client=summon&freeimage=true