REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. However, an attack model is identified to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k-anonymity privacy requirement.…

Read More

Trust Management for Defending On-Off Attacks

Trust Management for Defending On-Off Attacks A trust management scheme can be used to aid an automated decision-making process for an access control policy. Since unintentional temporary errors are possible, the trust management solution must provide a redemption scheme to allow nodes to recover trust. However, if a malicious node tries to disguise its malicious behaviors as unintentional temporary errors, the malicious node may be given more opportunities to attack the system by disturbing the redemption scheme. Existing trust management schemes that employ redemption schemes fail to discriminate between temporary…

Read More

Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this context, preventing or detecting malicious nodes launching grayhole or collaborative blackhole attacks is a challenge. This paper attempts to resolve this issue by designing a dynamic source…

Read More

Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenishable energy resources. A novel secure and efficient Cost-Aware SEcure Routing (CASER) protocol is proposed to address these two conflicting issues through two adjustable parameters: energy balance control (EBC) and probabilistic-based random walking. The energy consumption is severely disproportional to the uniform energy deployment for the given network topology, which greatly reduces the lifetime of the sensor networks. To solve this problem, an efficient…

Read More

Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks A secure protocol for Establishing STAble and reliable Routes (E-STAR) is proposed for establishing stable and reliable routes in heterogeneous multihop wireless networks (HMWNs). E-STAR combines payment and trust systems with a trust-based and energy-aware routing protocol. The payment system rewards the nodes that relay others’ packets and charges those that send packets. The trust system evaluates the nodes’ competence and reliability in relaying packets in terms of multi-dimensional trust values. The trust values are attached to the nodes’ public-key…

Read More

A Provably Secure, Efficient and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

A Provably Secure, Efficient and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks Smart card-based authentication scheme for heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it employs only hash function and XOR operation. However, we found that Turkanovic et al.’s scheme is vulnerable to impersonation attack with node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy. We propose an efficient scheme to overcome all those weaknesses. Moreover, an advanced scheme is proposed, which provides…

Read More

2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET

2FLIP: A Two-Factor Lightweight Privacy-Preserving  Authentication Scheme for VANET Download Project Synopsis Authentication in vehicular ad hoc network (VANET) requires not only secure and efficient authentication with privacy preservation but also applicable flexibility to handle complicated transportation circumstances. In this paper, we proposed a TWO-Factor LIghtweight Privacy preserving authentication scheme (2FLIP) to enhance the security of VANET communication. 2FLIP employs the decentralized certificate authority (CA) and the biological password based two factor authentication (2FA) to achieve the goals. Based on decentralized CA, 2FLIP only requires several extreme lightweight hashing process…

Read More

CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes

CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node behaviour. Thus, the overall network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to…

Read More

A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm Optimization

A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm Optimization Wireless sensor network is becoming a progressively Important and challenging research area. Advancement in WSN enable a wide range of environmental monitoring and object tracking system. Wireless sensor networks consists of small low cost sensor nodes, having a limited transmission range and their processing, storage capabilities and energy resources are limited. We consider energy constrained wireless sensor network deployed over a region. The main task of such a network is to gather information from node and transmit it…

Read More

Lightweight authentication protocol used in wireless sensor network

Lightweight authentication protocol used in wireless sensor network CRT (Chinese remainder Theorem Algorithm) implementation in NS2 TCL script Indoor positioning system is implemented using sensors that use Wi-Fi triangulation to compute the position of a mobile device in a given area. This group of sensors placed in an unattended environment form a Wireless Sensor Network (WSN). These nodes in WSN are more vulnerable to passive and active attacks than wired sensors due to limitations in resources, unrestrained environments and their broadcasting nature. Security will be a significant factor in such…

Read More