A dynamic TDMA based scheme for securing query processing in WSN

被引:23
作者
Ghosal, Amrita [1 ]
Halder, Subir [1 ]
DasBit, Sipra [2 ]
机构
[1] Dr BC Roy Engn Coll, Dept Comp Sci & Engn, Durgapur, India
[2] Bengal Engn & Sci Univ, Dept Comp Sci & Technol, Sibpur, India
关键词
Dynamic TDMA; Replay attack; Denial of Service (DoS) attack; Authentication; Data integrity; Data freshness; SENSOR; COMMUNICATION; PROTOCOLS;
D O I
10.1007/s11276-011-0393-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending such attacks becomes a big challenge. We propose a scheme to build a security mechanism in a query-processing paradigm within WSN. The scheme is capable of protecting replay attack while preserving essential properties of security such as authentication, data integrity and data freshness. The solution is made lightweight using symmetric key cryptography with very short-length key. Further, the key used in our scheme is neither pre-deployed nor is transmitted directly. The key information is established among nodes through an efficient use of one variant of dynamic TDMA mechanism which ensures security of key. Another variant of dynamic TDMA is used to make the scheme bandwidth saving, an essential quality of WSN. Performance of the scheme is analyzed in terms of storage, computation and communication overhead. Finally the analytical results are compared with two of the existing schemes including the previous version of the present scheme that show significant reduction of all such overheads thereby proving the suitability of the proposed scheme for a resource-constrained network like WSN.
引用
收藏
页码:165 / 184
页数:20
相关论文
共 30 条
[1]
A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]
[Anonymous], ATM CORP PROD DOC
[3]
[Anonymous], P ANNIE C
[4]
[Anonymous], P INT C SYST NETW CO
[5]
[Anonymous], TIME DIVISION MULTIP
[6]
[Anonymous], LNCS
[7]
Bashar S., 2009, P 28 IEEE GLOBECOM, P1
[8]
Byung Chul Kim, 1994, Wireless Personal Communications, V1, P313
[9]
Crosby GV, 2006, DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, P13
[10]
Das Bit S., 2008, Foundations of Computing and Decision Sciences, V33, P211