Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation

  • Authors:
  • Sanjay K. Dhurandher;Mohammad S. Obaidat;Ankit Mahendru;Lakshaya Agnani

  • Affiliations:
  • University of Delhi, New Delhi, India;Monmouth University, NJ;University of Delhi, New Delhi, India;University of Delhi, New Delhi, India

  • Venue:
  • Proceedings of the 14th Communications and Networking Symposium
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The design of the protocol is motivated by the observation that a single-fold security mechanism is usually not sufficient for the prevention of network attacks such as Denial of service (Dos) attacks, Sybil attacks and cannot prevent the leakage of information through covert channels; one such example being the SPINS protocol. The protocol has been designed such that major attacks are prevented and the level of data security and integrity is increased for the complete lifetime of the network. The proposed design achieves three main objectives. One being the authentication mechanism by which the malicious nodes present in the network is identified. Secondly, it takes measures to oust the identified malicious node from the network. Thirdly, it provides the transmission of the encrypted data to the base station (BS), which is collected by the deployed sensor nodes.