{"title":"HySecNJoining:一种用于无线传感器网络的混合安全节点加入算法","authors":"H. Kalita, A. Kar","doi":"10.1109/COMSNETS.2011.5716524","DOIUrl":null,"url":null,"abstract":"A wireless sensor network consists of several sensor nodes strewn over a large geographic area and base station. Depending upon the routing model used data collected by the sensor node are routed through several hops of the network to the base station. Before a new node becomes operational the base station verifies its authenticity for security reasons. We call this phase as secure joining of a node. The process of secure joining can be as simple as allowing a new node to join by simply verifying its MAC-ID in plain text. However, this simple secure joining is prone to many attacks and therefore, not acceptable to many organizations requiring high grade of security. On the other hand stringent process of secure joining such as multi-level verification of authentication credentials in a secure channel comes with a cost in terms of energy consumption. In this paper we propose a stringent secure joining method which uses the concept of certificate less PKI and symmetric key and goes through multi-level authentication for prevention of flooding attack.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network\",\"authors\":\"H. Kalita, A. Kar\",\"doi\":\"10.1109/COMSNETS.2011.5716524\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A wireless sensor network consists of several sensor nodes strewn over a large geographic area and base station. Depending upon the routing model used data collected by the sensor node are routed through several hops of the network to the base station. Before a new node becomes operational the base station verifies its authenticity for security reasons. We call this phase as secure joining of a node. The process of secure joining can be as simple as allowing a new node to join by simply verifying its MAC-ID in plain text. However, this simple secure joining is prone to many attacks and therefore, not acceptable to many organizations requiring high grade of security. On the other hand stringent process of secure joining such as multi-level verification of authentication credentials in a secure channel comes with a cost in terms of energy consumption. In this paper we propose a stringent secure joining method which uses the concept of certificate less PKI and symmetric key and goes through multi-level authentication for prevention of flooding attack.\",\"PeriodicalId\":302678,\"journal\":{\"name\":\"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-02-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSNETS.2011.5716524\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS.2011.5716524","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network
A wireless sensor network consists of several sensor nodes strewn over a large geographic area and base station. Depending upon the routing model used data collected by the sensor node are routed through several hops of the network to the base station. Before a new node becomes operational the base station verifies its authenticity for security reasons. We call this phase as secure joining of a node. The process of secure joining can be as simple as allowing a new node to join by simply verifying its MAC-ID in plain text. However, this simple secure joining is prone to many attacks and therefore, not acceptable to many organizations requiring high grade of security. On the other hand stringent process of secure joining such as multi-level verification of authentication credentials in a secure channel comes with a cost in terms of energy consumption. In this paper we propose a stringent secure joining method which uses the concept of certificate less PKI and symmetric key and goes through multi-level authentication for prevention of flooding attack.