Journal ArticleDOI
Secure anonymous communication for wireless sensor networks based on pairing over elliptic curves
Reads0
Chats0
TLDR
Security analysis of the proposed protocol shows that it provides complete anonymity for communicating nodes and is robust against a number of attacks including the masquerade attack, wormhole attack, selective forwarding attack and message manipulation attack.Abstract:
The nature of wireless communication makes it susceptible to a number of security threats, disclosing the identities of the communicating parties in the network. By revealing the identity of nodes in the network, outside parties can setup severe targeted attacks on specific nodes. Such targeted attacks are more harmful to sensor networks as sensing nodes (sensors) have limited computing and communication power prohibiting them from using robust security mechanisms. Anonymous communication is one of the key primitives for ensuring the privacy of communicating parties in a group or network. In this paper, we propose a novel secure anonymous communication protocol based on pairing over elliptic curves for wireless sensor networks (WSNs). Using this protocol, only the legitimate nodes in the sensor network can authenticate each other without disclosing their real identities. The proposed protocol is extremely efficient in terms of key storage space and communication overhead. Security analysis of our protocol shows that it provides complete anonymity for communicating nodes. The analysis also shows that the proposed protocol is robust against a number of attacks including the masquerade attack, wormhole attack, selective forwarding attack and message manipulation attack.read more
Citations
More filters
Journal ArticleDOI
Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear Pairing Functions
Mizanur Rahman,Khalil El-Khatib +1 more
TL;DR: A novel secure time synchronization protocol for both homogeneous and heterogeneous WSN models is proposed; the protocol uses pairing-based cryptography to secure the time synchronization and to reduce the communication and storage requirements of each node.
Journal Article
Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks
TL;DR: The efficacies of the User-Viewpoint models in the lab simulations are viewed as the most promising cost-effective, future security solutions to wormhole attacks.
Journal ArticleDOI
Trust-based spectrum sharing for cognitive radio networks
TL;DR: A trust aware model to authenticate the secondary users of CRNs is proposed which offers a reliable technique to provide a security-conscious decision by using trust evaluation for CRNs and an analytical model for analyzing the availability of spectrum in CRNs using a stochastic approach is proposed.
References
More filters
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Proceedings ArticleDOI
A key-management scheme for distributed sensor networks
TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Journal ArticleDOI
Secure routing in wireless sensor networks: attacks and countermeasures
Chris Karlof,David Wagner +1 more
TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.