Chain Identity Attestation (CIA) Method for Preventing Node Cloning Attack in Wireless Sensor Network

Authors

  • Norhaflyza Marbukhari InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.
  • Yusnani Mohd Yusoff InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.
  • Syed Farid Syed Adnan InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.
  • Mohd Anuar Mat Isa InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.
  • Nazhatul Hafizah Kamarudin InSTIL Research Initiative Groups, Computer Engineering Department, University Teknologi MARA (UiTM) Shah Alam, Selangor, Malaysia.

Keywords:

Node Identity, Node Impersonation, Trusted Sensor Node, Wireless Sensor Network,

Abstract

This paper presents a new technique in preventing node cloning attack. The significant contribution of this method or technique is in preventing node impersonation attack in Wireless Sensor Network (WSN). The new method named as Chain Identity Attestation Method (CIA) was developed on the basis of Diffie-Hellman hard problem algorithm. The exclusivity of CIA method is in the generation of node identity. In this method, the node identity is in each session. In other words, node identity is no longer fixed to a certain value. Perfect forward secrecy attack model is used to prove the security of this CIA method.

References

Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod, “Cryptographic Adversary Model: Timing and Power Attacks”, Trans. Eng. Technol. Springer,2015.

Kalita, H. K. and Kar, A., W s n s a., 1(1), 2009, pp.1–10.

Sharma, R., Chaba, Y. & Singh, Y., “Analysis of Security Protocols in Wireless Sensor Network”, International Journal of Advanced, vol.713, 2010, pp. 707–713.

Mohammadi, S. and Jadidoleslamy, H., “A comparison of physical attacks on wireless sensor networks”, International Journal of Peer to Peer Networks, vol.2, no.2, 2011, pp.24–42.

Udgata, S.K., Mubeen, a & Sabat, S.L., “Wireless Sensor Network Security Model Using Zero Knowledge Protocol”, Communications (ICC), 2011 IEEE International Conference, 2011, pp.1–5.

Capkun, S. and Hubaux. J. -P., “Secure positioning of wireless devices with application to sensor networks”, Infocom, vol.313, no.3,2005, pp. 1917–1928.

Ding, M. et al., 2005. Localized fault-tolerant event boundary detection in sensor networks. Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. 2.

Kyasanur, P. and Vaidya, N. H., 2003. Detection and Handling of MAC Layer Misbehavior in Wireless Networks. Proceedings of the International Conference on Dependable Systems and Networks.173–182.

Xing, K. X. K. et al., “Real-Time Detection of Clone Attacks in Wireless Sensor Networks”, 2008 The 28th International Conference on Distributed Computing Systems, 2008, pp.3–10.

Boneh, D. and Franklin, M., Zhu, W.T., “Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme”, 2011 International Conference on Network Computing and Information Security, vol. 2, 2003, pp.156–160.

“Identity-Based Encryption from the Weil Pairing”, SIAM Journal on Computing, 32, pp.586–615.

Lyubashevsky, V., “Lattice-Based Identification Schemes Secure”, 2008, pp.162–179.

Mandal, S. and Mohanty, S., “Multi-party Key-Exchange with Perfect Forward Secrecy”, 2014 International Conference on Information Technology, 2014, pp.362–367.

Leu, J.-S. and Hsieh, W.-B., “Efficient and secure dynamic ID based remote user authentication scheme for distributed systems using smart cards”, IET Information Security, 2014, pp.104–113.

Li, Z. and Gong, G., “On the Node Clone Detection in Wireless Sensor Networks”, vol.21, no.6, 2013, pp.1799–1811.

Lee, C.C., Lai, Y.M. & Li, C.T., “An improved secure dynamic ID based remote user authentication scheme for multi-server environment”, International Journal of Security and its Applications,

vol.6, no.1, 2012, pp.203.

Downloads

Published

2017-03-15

How to Cite

Marbukhari, N., Mohd Yusoff, Y., Syed Adnan, S. F., Mat Isa, M. A., & Kamarudin, N. H. (2017). Chain Identity Attestation (CIA) Method for Preventing Node Cloning Attack in Wireless Sensor Network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1-4), 151–155. Retrieved from https://jtec.utem.edu.my/jtec/article/view/1798