Chain Identity Attestation (CIA) Method for Preventing Node Cloning Attack in Wireless Sensor Network
Keywords:Node Identity, Node Impersonation, Trusted Sensor Node, Wireless Sensor Network,
AbstractThis paper presents a new technique in preventing node cloning attack. The significant contribution of this method or technique is in preventing node impersonation attack in Wireless Sensor Network (WSN). The new method named as Chain Identity Attestation Method (CIA) was developed on the basis of Diffie-Hellman hard problem algorithm. The exclusivity of CIA method is in the generation of node identity. In this method, the node identity is in each session. In other words, node identity is no longer fixed to a certain value. Perfect forward secrecy attack model is used to prove the security of this CIA method.
Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod, “Cryptographic Adversary Model: Timing and Power Attacks”, Trans. Eng. Technol. Springer,2015.
Kalita, H. K. and Kar, A., W s n s a., 1(1), 2009, pp.1–10.
Sharma, R., Chaba, Y. & Singh, Y., “Analysis of Security Protocols in Wireless Sensor Network”, International Journal of Advanced, vol.713, 2010, pp. 707–713.
Mohammadi, S. and Jadidoleslamy, H., “A comparison of physical attacks on wireless sensor networks”, International Journal of Peer to Peer Networks, vol.2, no.2, 2011, pp.24–42.
Udgata, S.K., Mubeen, a & Sabat, S.L., “Wireless Sensor Network Security Model Using Zero Knowledge Protocol”, Communications (ICC), 2011 IEEE International Conference, 2011, pp.1–5.
Capkun, S. and Hubaux. J. -P., “Secure positioning of wireless devices with application to sensor networks”, Infocom, vol.313, no.3,2005, pp. 1917–1928.
Ding, M. et al., 2005. Localized fault-tolerant event boundary detection in sensor networks. Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. 2.
Kyasanur, P. and Vaidya, N. H., 2003. Detection and Handling of MAC Layer Misbehavior in Wireless Networks. Proceedings of the International Conference on Dependable Systems and Networks.173–182.
Xing, K. X. K. et al., “Real-Time Detection of Clone Attacks in Wireless Sensor Networks”, 2008 The 28th International Conference on Distributed Computing Systems, 2008, pp.3–10.
Boneh, D. and Franklin, M., Zhu, W.T., “Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme”, 2011 International Conference on Network Computing and Information Security, vol. 2, 2003, pp.156–160.
“Identity-Based Encryption from the Weil Pairing”, SIAM Journal on Computing, 32, pp.586–615.
Lyubashevsky, V., “Lattice-Based Identification Schemes Secure”, 2008, pp.162–179.
Mandal, S. and Mohanty, S., “Multi-party Key-Exchange with Perfect Forward Secrecy”, 2014 International Conference on Information Technology, 2014, pp.362–367.
Leu, J.-S. and Hsieh, W.-B., “Efficient and secure dynamic ID based remote user authentication scheme for distributed systems using smart cards”, IET Information Security, 2014, pp.104–113.
Li, Z. and Gong, G., “On the Node Clone Detection in Wireless Sensor Networks”, vol.21, no.6, 2013, pp.1799–1811.
Lee, C.C., Lai, Y.M. & Li, C.T., “An improved secure dynamic ID based remote user authentication scheme for multi-server environment”, International Journal of Security and its Applications,
vol.6, no.1, 2012, pp.203.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.