scispace - formally typeset
Journal ArticleDOI

Secure anonymous communication for wireless sensor networks based on pairing over elliptic curves

Reads0
Chats0
TLDR
Security analysis of the proposed protocol shows that it provides complete anonymity for communicating nodes and is robust against a number of attacks including the masquerade attack, wormhole attack, selective forwarding attack and message manipulation attack.
Abstract
The nature of wireless communication makes it susceptible to a number of security threats, disclosing the identities of the communicating parties in the network. By revealing the identity of nodes in the network, outside parties can setup severe targeted attacks on specific nodes. Such targeted attacks are more harmful to sensor networks as sensing nodes (sensors) have limited computing and communication power prohibiting them from using robust security mechanisms. Anonymous communication is one of the key primitives for ensuring the privacy of communicating parties in a group or network. In this paper, we propose a novel secure anonymous communication protocol based on pairing over elliptic curves for wireless sensor networks (WSNs). Using this protocol, only the legitimate nodes in the sensor network can authenticate each other without disclosing their real identities. The proposed protocol is extremely efficient in terms of key storage space and communication overhead. Security analysis of our protocol shows that it provides complete anonymity for communicating nodes. The analysis also shows that the proposed protocol is robust against a number of attacks including the masquerade attack, wormhole attack, selective forwarding attack and message manipulation attack.

read more

Citations
More filters
Journal ArticleDOI

Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear Pairing Functions

TL;DR: A novel secure time synchronization protocol for both homogeneous and heterogeneous WSN models is proposed; the protocol uses pairing-based cryptography to secure the time synchronization and to reduce the communication and storage requirements of each node.
Journal Article

Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks

TL;DR: The efficacies of the User-Viewpoint models in the lab simulations are viewed as the most promising cost-effective, future security solutions to wormhole attacks.
Journal ArticleDOI

Trust-based spectrum sharing for cognitive radio networks

TL;DR: A trust aware model to authenticate the secondary users of CRNs is proposed which offers a reliable technique to provide a security-conscious decision by using trust evaluation for CRNs and an analytical model for analyzing the availability of spectrum in CRNs using a stochastic approach is proposed.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Related Papers (5)