Skip to main content
Log in

On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks

  • Patient Facing Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN’s has many constrictions, including low computation capability, less memory,limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Yong Wang, Grahan Attebury, Byrav Ramamurthy (2006) “A survey of security issues in wireless sensor networks”, IEEE communications surveys. pp 2–22

  2. J. Hill et al. (2000) “System architecture directions for networked sensors” ASPLOSIX: 9TH international conf., architectural support for programming languages and operating systems, New York, ACM press, pp 93–104.

  3. Xiang Qian Chen, Kia Makki, Kang Yen, Nikki Pissionou (2009), “Sensor network security: a survey”, IEEE communications and tutorials. vol 2, pp 52–73.

  4. C.Gnanakousalya,G.SAnandha mala(2012),secure and energy efficient traffic aware key management scheme for wireless sensor networks,International Journal for Networks,pp112-121.

  5. David R.Raymond,Scott.F.Midkiff,(2008)Denial of service in wireless sensor networks:Attacks and defenses,IEEE CS,pp74-81.

  6. Thomas Claveriole Marcelo, Dias de Amorim, Michel Abdalla, Yanis Viniotis (2008) “Securing wireless sensor network against aggregator compromises”, IEEE communication magazine: pp 134–141

  7. Ti Tan, Shamiksengupta, K.P. Subbalakshmi (2011) “Analysis of coordinated denial of service attacks in IEEE802.22 networks”, IEEE pp 890–902.

  8. K. Gill, S.H. Yang, W. Wang (2012) “Scheme for preventing low level denial of service attackson wireless sensor networks based home automation systems”, IET, Wireless sensor systems, pp 361–368

  9. DaojingHe,Sammy Chan(2012),Dicode-dos resistant and distributed code dissemination in wireless sensor networks,IEEE transaction on wireless communication,pp1946-1956.

  10. Mario Cagalj, Srdjan Capkun, Jean-Piere Hubaux (2007) “Wormhole based anti jamming techniques in sensor networks”. IEEE transaction on mobile computing, pp 100–114.

  11. NA Ruan, Yoshiaki Hori (2012),“DOS attack tolerant TESLA based broadcost authentication protocol in internet of things”, IEEE international conference on mobile and wireless networking, pp 60-65.

  12. Manju V.C, Kumar M. Sasi (2012) “Detection of jamming style DOS attacks in wireless sensor networks”, IEEE international conference on parallel distributed and grid computing, pp 563–567

  13. M. Abdalla, J.H. Any, M. Bellarez, C. Namprempre (2002) “From identification to signature via the fiat shamir transform minimizing assumptions for security and forward security”, Eurocryot 2002, pp 1–27

  14. Lin TH, Lee TF (2014) “Secure verifier based three party authentication schemes without server public keys for data exchange in telecare medicine information systems”, J med syst, 38(5).

  15. Zuown Tan, et al. (2014) “A user anonymity preserving three factor authentication scheme for telecare medicine information systems”, J Med syst, 38(3).

  16. Yan WE, Phan RC (2013) “Security analysis of a chaoti map based authentication scheme for telecare medicine information systems”, J Med Syst 37(6).

  17. Yan X, Li W, Li P, Wang J, Hao X, Gong P (2013) “A secure biometrics based authentication scheme for telecare medicine information systems”, J Med Syst 37(5).

  18. Guo R, Wen Q, Shi H, Jin Z, Zhang H (2013),“An efficient and provable certificate less public key encryption key for telecare medicine information systems”, J Med Syst 37(5).

  19. Tsung-hung lin,Tian Fu lee (2014)Secure verifier based three party authentication schemes without server public keys for data exchange in telecare medicine information systems.Journal of medical systems

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Nirmal Raja.

Additional information

This article is part of the Topical Collection on Patient Facing Systems

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raja, K.N., Beno, M.M. On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks. J Med Syst 38, 84 (2014). https://doi.org/10.1007/s10916-014-0084-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-014-0084-3

Keywords

Navigation