ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor network Online publication date: Thu, 30-Apr-2015
by N. Ambika; G.T. Raju
International Journal of Security and Networks (IJSN), Vol. 9, No. 2, 2014
Abstract: Network without security becomes a threat to integrity and authentication. Sensor network consists of cheap, tiny devices which can be incarcerated to provide erroneous data to the concerned authority. Hence integrity and authentication becomes a foremost concern. This paper utilises both preventive and detection measures to cope with different kinds of attacks in the network layer. In this paper, pairwise key is being generated utilising auxiliary nodes. The paper enhances security of the network against Sybil attack, Sinkhole attack and Wormhole attack.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com