Monitoring Cryptographic Strength of Wireless Sensor Networks Using Knowledge-Zero Protocol

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
The security mechanisms used for wired networks cannot be directly used in sensor networks as there is no user-controlling of each individual node, wireless environment, and more importantly, scarce energy resources. In this paper, the authors address some of the special security threats and attacks in Wireless Sensor Networks offer a powerful methodology to monitor environments, and have a lot of interesting applications, they propose a scheme for detection of distributed sensor cloning attack and use of zero knowledge protocol for verifying the authenticity of the sender sensor nodes. The cloning attack is addressed by attaching a unique fingerprint to each node that depends on the set of neighboring nodes and itself.
Download Now

Find By Topic