Malicious Node Detection in Wireless Sensor Networks using Cryptographic Authentication and Certificate Revocation Mechanism

Authors

  • TC Swetha Priya Dept. of Information Technology, Stanley College of Engineering and Technology for Women, Hyderabad, India
  • A Kanaka Durga Dept. of Information Technology, Stanley College of Engineering and Technology for Women, Hyderabad, India

DOI:

https://doi.org/10.26438/ijcse/v7i12.1620

Keywords:

Authentication, Certificates, Cluster, malicious node, message digest, Revocation, Wireless Sensor Network

Abstract

Security is one of the major issues in the current scenario. Because of the wireless nature of the nodes present in Wireless Sensor Networks, there is a chance of the nodes getting easily affected to severe security attacks. One such attack is a Selective Forwarding Attack in which the malicious nodes gain access to the wireless network and interrupts the data communication, overwrites the data packets, drops the packets and degrades the wireless network performance. In this paper, an effective cryptographic protocol using Authentication technique is proposed. To separate the attacking nodes in participating in the future networking activities, a Certificate Revocation Method is also proposed. This paper guarantees security to the nodes and do not allow access to any of the affected nodes by using a more efficient Authentication method. It also improves the performance of a network. Through simulation, the correctness and efficiency of the scheme is verified.

References

[1] Aggarwal, S., Goyal Astt Professor, N., & Aggarwal Astt Professor MRCE, K. (2014). “A review of Comparative Study of MD5 and SHA Security Algorithm”. International Journal of Computer Applications.

[2] Wei Liu, Student Member, IEEE, Hiroki Nishiyama, Member, IEEE, Nirwan Ansari, Fellow, IEEE, Jie Yang, and Nei Kato, Senior Member, IEEE “Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks”.

[3] Youtao Zhang, Jun Yang, Weijia Li, Linzhang Wang, Lingling Jin: “An authentication scheme for locating compromised sensor nodes in WSNs”, Journal of Network and Computer Applications, vol.33, pp.50-62, 2010.

[4] Sungwook Kim, “Effective Certificate Revocation Scheme based on Weighted Voting Game Approach”, IET Information Security, Vol. 10, No. 4, pp. 180-187, 2016.

[5] K. Park, H. Nishiyama, N. Ansari, And N. Kato, “Certificate Revocation To Cope With False Accusations In Mobile Ad Hoc Networks”, In Proc. 2010 Ieee 71st Vehicular Technology Conference: Vtc2010-Spring, Taipei, Taiwan, May 16-19, 2010.

[6] Madhumita Panda, “Security in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER) 2014 Volume-03, Issue-01, pp-50-56.

[7] Priti Rathi, Parikshit Mahalle, “Certificate Revocation in Mobile Ad Hoc Networks,” International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 1, January 2013.

[8] Khawla Naji Shnaikat and Ayman Ahmed AlQudah, “Key Management Techniques in Wireless Sensor Networks”, International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014.

[9] Claude Crêpeau and Carlton R. Davis,” A Certificate Revocation Scheme for Wireless Ad Hoc Networks“ School of Computer Science, McGill University, Montreal, QC, Canada H3A 2A7.

[10] E.K. Neena and C. Balakrishnan,”Cluster Based Certificate Revocation of Attacker’s Nodes in MANET”, International Journal of Computer Science and Engineering(IJCSE), Vol 2, Issue 1, January 2014.

Downloads

Published

2019-12-31
CITATION
DOI: 10.26438/ijcse/v7i12.1620
Published: 2019-12-31

How to Cite

[1]
S. P. TC and K. D. A, “Malicious Node Detection in Wireless Sensor Networks using Cryptographic Authentication and Certificate Revocation Mechanism”, Int. J. Comp. Sci. Eng., vol. 7, no. 12, pp. 16–20, Dec. 2019.

Issue

Section

Research Article