The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Security is a very decisive factor for Wireless Sensor Networks because of ever growing popularity in the tangible world. These types of resource constrained network suffers from physical attack, i.e. Node clone attack. Methods/Statistical Analysis: In Node clone attack an attacker capture a node, modify it and replicate clone node in WSNs. The main motive of these clone nodes to obtain mastery over the whole network and to aggravate various inside attacks against sensor networks. The message during communication from the one legitimate node to another legitimate node is also not secure thus altered by the attacker. Findings: In this paper, we propose an efficient algorithm for securing message communication in Wireless Sensor Networks (WSNs) from node clone attack. This algorithm makes use of the hybrid cryptography technique which consist of Advanced Encryption Standard (AES) and Elliptical Curve Cryptography (ECC) and lightweight hash function. In this algorithm, AES algorithm encrypts the message and digital signature whereas ECC algorithm encrypts the private key and generates digital signature. The lightweight hash function produces small and fixed size hash digest from the message. The analysis of the proposed algorithm is performed on the ground of parameters like computational overhead, communication overhead, storage overhead and high security level. Application/Improvements: The proposed algorithm authenticate message during communication with confidentiality. The analysis indicates that the suggested algorithm is suited for energy constrained sensor networks.

Keywords

Wireless Sensor Network, Node Clone Attack, AES, ECC, Hybrid Cryptography
User