Chain Identity Attestation (CIA) Method for Preventing Node Cloning Attack in Wireless Sensor Network

Authors

  • Norhaflyza Marbukhari InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.
  • Yusnani Mohd Yusoff InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.
  • Syed Farid Syed Adnan InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.
  • Mohd Anuar Mat Isa InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.
  • Nazhatul Hafizah Kamarudin InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.

Keywords:

Node Identity, Node Impersonation, Trusted Sensor Node, Wireless Sensor Network,

Abstract

This paper presents a new technique in preventing node cloning attack. The significant contribution of this method or technique is in preventing node impersonation attack in Wireless Sensor Network (WSN). The new method named as Chain Identity Attestation Method (CIA) was developed on the basis of Diffie-Hellman hard problem algorithm. The exclusivity of CIA method is in the generation of node identity. In this method, the node identity is in each session. In other words, node identity is no longer fixed to a certain value. Perfect forward secrecy attack model is used to prove the security of this CIA method.

Downloads

Download data is not yet available.

Downloads

Published

2017-03-15

How to Cite

Marbukhari, N., Mohd Yusoff, Y., Syed Adnan, S. F., Mat Isa, M. A., & Kamarudin, N. H. (2017). Chain Identity Attestation (CIA) Method for Preventing Node Cloning Attack in Wireless Sensor Network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1-4), 151–155. Retrieved from https://jtec.utem.edu.my/jtec/article/view/1798