Defense against outside attacks in wireless sensor networks

  • Authors:
  • Somanath Tripathy;Sukumar Nandi

  • Affiliations:
  • Department of Information Technology, North Eastern Hill University, Shillong 793022, India;Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati 781039, India

  • Venue:
  • Computer Communications
  • Year:
  • 2008

Quantified Score

Hi-index 0.24

Visualization

Abstract

Networking unattended wireless sensors have significant impact on both military and non-military applications. Efficiency of wireless sensor network (WSN) depends on the correctness of the information those have been collected. At the same time, security is most important to prevent outsiders (i.e. illegitimate party) from retrieving the correct information. This paper proposes a user authentication mechanism to countermeasure the outside attacks. The salient feature of the proposed technique is that it establishes threshold number of session keys simultaneously between the user and individual sensor nodes during a single authentication process without using the public key cryptography. The proposed scheme therefore, reduces the computational complexity on one hand and enhances the security aspects on the other.