{"title":"利用聚合签名方案提高WSN中防范不同攻击的安全性","authors":"T. Nivedha, K. Jayanthi","doi":"10.1109/WISPNET.2018.8538476","DOIUrl":null,"url":null,"abstract":"In Wireless Sensor Network (WSN) transmitting the data is common but protecting the transferred information is more important. For example, in military surveillance scenario, an attacker may observe the sensor data moving from source to the sink and could identify the sink node location and may acquire the data directly. Under such circumstances, providing security and authentication is very essential. The objective of the work is to eliminate different attackers using aggregate signature scheme and provide security and authentication using Digital Signature (DS) and Additive Homomorphic Encryption (AHE) scheme. In this proposed work, the sink node (base station) broadcast hello message to sensor nodes for evaluating the node energy and distance and then clustering process is activated for Cluster head selection. Sink node generates the key for digital signature using the SHA1 algorithm and verifies the signature by using DSA verification code. AHE is added for secure transfer of data from Cluster head to sink node and also authentication is done between cluster head and nodes. Malicious nodes are added to the network to absorb the packets and to mimic a threat scenario. The performance metrics like Communication overhead, Energy consumption, and Packet delivery rate are analyzed from the obtained results and they are found to be better than the performance of the existing work.","PeriodicalId":6858,"journal":{"name":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"728 1","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN\",\"authors\":\"T. Nivedha, K. Jayanthi\",\"doi\":\"10.1109/WISPNET.2018.8538476\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Wireless Sensor Network (WSN) transmitting the data is common but protecting the transferred information is more important. For example, in military surveillance scenario, an attacker may observe the sensor data moving from source to the sink and could identify the sink node location and may acquire the data directly. Under such circumstances, providing security and authentication is very essential. The objective of the work is to eliminate different attackers using aggregate signature scheme and provide security and authentication using Digital Signature (DS) and Additive Homomorphic Encryption (AHE) scheme. In this proposed work, the sink node (base station) broadcast hello message to sensor nodes for evaluating the node energy and distance and then clustering process is activated for Cluster head selection. Sink node generates the key for digital signature using the SHA1 algorithm and verifies the signature by using DSA verification code. AHE is added for secure transfer of data from Cluster head to sink node and also authentication is done between cluster head and nodes. Malicious nodes are added to the network to absorb the packets and to mimic a threat scenario. The performance metrics like Communication overhead, Energy consumption, and Packet delivery rate are analyzed from the obtained results and they are found to be better than the performance of the existing work.\",\"PeriodicalId\":6858,\"journal\":{\"name\":\"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)\",\"volume\":\"728 1\",\"pages\":\"1-4\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WISPNET.2018.8538476\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WISPNET.2018.8538476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN
In Wireless Sensor Network (WSN) transmitting the data is common but protecting the transferred information is more important. For example, in military surveillance scenario, an attacker may observe the sensor data moving from source to the sink and could identify the sink node location and may acquire the data directly. Under such circumstances, providing security and authentication is very essential. The objective of the work is to eliminate different attackers using aggregate signature scheme and provide security and authentication using Digital Signature (DS) and Additive Homomorphic Encryption (AHE) scheme. In this proposed work, the sink node (base station) broadcast hello message to sensor nodes for evaluating the node energy and distance and then clustering process is activated for Cluster head selection. Sink node generates the key for digital signature using the SHA1 algorithm and verifies the signature by using DSA verification code. AHE is added for secure transfer of data from Cluster head to sink node and also authentication is done between cluster head and nodes. Malicious nodes are added to the network to absorb the packets and to mimic a threat scenario. The performance metrics like Communication overhead, Energy consumption, and Packet delivery rate are analyzed from the obtained results and they are found to be better than the performance of the existing work.