Javascript must be enabled to continue!
Detection of Replay Attack through Sequence Number Encryption in EDDK based WSNs
View through CrossRef
Wireless sensor networks can be used to deliver status information to users in real time. The sensor nodes used in wireless sensor networks are arranged by attaching sensors to acquire necessary information, such as vibration, sound, light, and temperature. Since a sensor node is small in size and inexpensive, it is advantageous for monitoring large areas. When a sensor node senses a change in a situation, this event information is wirelessly communicated with other sensor nodes and transmitted to a base station. However, since the sensor nodes used in wireless sensor networks are small and inexpensive, there are restrictions in terms of their battery life, memory, and computing power. An attacker can easily compromise a sensor node and use a compromised node to attempt message tampering and energy consumption attacks. EDDK is a scheme that detects attacks from compromised nodes through key management. EDDK uses a pairwise key and a local cluster key to defend against various attacks in the network. In addition, EDDK protects against replay attacks by using sequence numbers and guarantees message integrity. However, since the sequence number and sensor node ID are not encrypted, they can be used as an attack element. An attacker can attempt a replay attack by manipulating the sequence number through sniffing. A replay attack that occurs in a wireless sensor network consumes sensor node energy and confuses the user. In order to defend against such an attack, we propose a sequence number encryption scheme. The proposed scheme detects new types of replay attacks and shows about 7% energy improvement.
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Title: Detection of Replay Attack through Sequence Number Encryption in EDDK based WSNs
Description:
Wireless sensor networks can be used to deliver status information to users in real time.
The sensor nodes used in wireless sensor networks are arranged by attaching sensors to acquire necessary information, such as vibration, sound, light, and temperature.
Since a sensor node is small in size and inexpensive, it is advantageous for monitoring large areas.
When a sensor node senses a change in a situation, this event information is wirelessly communicated with other sensor nodes and transmitted to a base station.
However, since the sensor nodes used in wireless sensor networks are small and inexpensive, there are restrictions in terms of their battery life, memory, and computing power.
An attacker can easily compromise a sensor node and use a compromised node to attempt message tampering and energy consumption attacks.
EDDK is a scheme that detects attacks from compromised nodes through key management.
EDDK uses a pairwise key and a local cluster key to defend against various attacks in the network.
In addition, EDDK protects against replay attacks by using sequence numbers and guarantees message integrity.
However, since the sequence number and sensor node ID are not encrypted, they can be used as an attack element.
An attacker can attempt a replay attack by manipulating the sequence number through sniffing.
A replay attack that occurs in a wireless sensor network consumes sensor node energy and confuses the user.
In order to defend against such an attack, we propose a sequence number encryption scheme.
The proposed scheme detects new types of replay attacks and shows about 7% energy improvement.
Related Results
A Security Key Management Method using Grid Routing for EDDK in WSNs
A Security Key Management Method using Grid Routing for EDDK in WSNs
Wireless sensor networks (WSNs) utilize event data collected through sensor nodes, which can be employed in different environments. Sensor nodes used in WSNs have limited energy an...
Evaluating hippocampal replay without a ground truth
Evaluating hippocampal replay without a ground truth
AbstractDuring rest and sleep, memory traces replay in the brain. The dialogue between brain regions during replay is thought to stabilize labile memory traces for long-term storag...
Theta-band phase locking during encoding leads to coordinated entorhinal-hippocampal replay
Theta-band phase locking during encoding leads to coordinated entorhinal-hippocampal replay
Abstract
Precisely timed interactions between hippocampal and cortical neurons during replay epochs are thought to support memory consolidation. ...
Exploring the roles of memory replay in targeted memory reactivation and birdsong development: Insights from computational models of complementary learning systems
Exploring the roles of memory replay in targeted memory reactivation and birdsong development: Insights from computational models of complementary learning systems
Abstract
Replay facilitates memory consolidation in both biological and artificial systems. Using the complementary learning systems (CLS) framework, we study repla...
An Adaptive Sensor Data Access Framework for Mobile and Web Environments
An Adaptive Sensor Data Access Framework for Mobile and Web Environments
Wireless Sensor Networks (WSNs) have emerged as a transformative technology, facilitating the real-time collection and dissemination of data from a myriad of physical environments....
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Post-learning replay of hippocampal-striatal activity is biased by reward-prediction signals
Post-learning replay of hippocampal-striatal activity is biased by reward-prediction signals
Abstract
Neural activity encoding recent experiences is replayed during sleep and rest to promote consolidation of memories. However, precisely which features of ex...
An Adaptive Topology Management Scheme to Maintain Network Connectivity in Wireless Sensor Networks
An Adaptive Topology Management Scheme to Maintain Network Connectivity in Wireless Sensor Networks
The roots of Wireless Sensor Networks (WSNs) are tracked back to US military developments, and, currently, WSNs have paved their way into a vast domain of civil applications, espec...

