Designing a secure architecture against wormhole attacks in wireless sensor networks

The dynamic nature of the Wireless Sensor Networks (WSNs) brought a great deal of challenges in preserving privacy of data or security of data where there exists a sets of malicious nodes with the regular nodes in the network where malicious nodes are harmful for the network and might destroy the ne...

Full description

Saved in:
Bibliographic Details
Published in:2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) pp. 1 - 6
Main Authors: Jigalur, Rohit S., Suresha, Bhushan, C.
Format: Conference Proceeding
Language:English
Published: IEEE 01-07-2013
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The dynamic nature of the Wireless Sensor Networks (WSNs) brought a great deal of challenges in preserving privacy of data or security of data where there exists a sets of malicious nodes with the regular nodes in the network where malicious nodes are harmful for the network and might destroy the network. And multiple nodes might be present to cooperate for providing services like data forwarding or packet forwarding to other nodes in the network. The attacker may try to reveal the data from the network. In recent epoch of modern communication, as the communication of information might be secret records, confidential messages or may be in digitized form like e-cheques, scanned certificates etc., these data has to be sent to desired destination with confidentiality. In this research work, we propose a secure architecture for monitoring of data in WSNs by preserving privacy of data i.e. secure architecture for routing of data by using digital signature against wormhole attack. We use a secret key mechanism where the secret key will be known to the sender and a receiver. The data will be encrypted by source and decrypted using secret key in the destination and all the nodes in the network must be registered with Trusted Authority (TA), and the data will be monitored in each node and it follows hop-by-hop transmission. The Advanced Encryption Standard (AES) scheme is used to strengthen the confidentiality and integrity of the data. The proposed work is simulated in Java and the results obtained using routing tables are shown.
DOI:10.1109/ICCCNT.2013.6726768