{"title":"A tow-level security approach for wireless sensor networks","authors":"Atefe Hosseiny, N. Farzaneh","doi":"10.1109/ICCKE.2017.8167902","DOIUrl":null,"url":null,"abstract":"In recent decades, the significant expansion and popularity of wireless sensor networks in various applications have attracted the attention of many researchers. Energy and security restrictions are main challenges for the researchers. The application of these networks in inaccessible and dangerous environments and wireless communications between nodes have led them to be subjected to direct attacks; also wireless sensor networks in addition to external attacks face a new challenge of internal attacks that actually have made the methods such as encryption and authentication insufficient and thus new security procedures are needed. Recently, trust as a new and efficient method and a soft security mechanism could deal with internal attacks and provide optimum security in these networks. In this scheme a new security method is provided for wireless sensor networks composed of two main levels. In the first level a key agreement and a new authentication method based on elliptic curve cryptography are used to deal with external attacks. In the second level, a trust-based method is provided to deal with internal attacks. Comparison and simulation suggest that the proposed design in addition to focusing on reducing the energy consumption was successful in increasing network security and resistance against many attacks.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE.2017.8167902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In recent decades, the significant expansion and popularity of wireless sensor networks in various applications have attracted the attention of many researchers. Energy and security restrictions are main challenges for the researchers. The application of these networks in inaccessible and dangerous environments and wireless communications between nodes have led them to be subjected to direct attacks; also wireless sensor networks in addition to external attacks face a new challenge of internal attacks that actually have made the methods such as encryption and authentication insufficient and thus new security procedures are needed. Recently, trust as a new and efficient method and a soft security mechanism could deal with internal attacks and provide optimum security in these networks. In this scheme a new security method is provided for wireless sensor networks composed of two main levels. In the first level a key agreement and a new authentication method based on elliptic curve cryptography are used to deal with external attacks. In the second level, a trust-based method is provided to deal with internal attacks. Comparison and simulation suggest that the proposed design in addition to focusing on reducing the energy consumption was successful in increasing network security and resistance against many attacks.