Title: ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor network

Authors: N. Ambika; G.T. Raju

Addresses: Department of MCA, Dayananda Sagar college of Engineering, Shavige Malleshwara Hills, Kumaraswamy Layout, Bangalore, Karnataka, 560078, India ' Computer Science Department, RNSIT, Uttarahalli Main Road, Channasandra, Bengaluru, Karnataka, 560098, India

Abstract: Network without security becomes a threat to integrity and authentication. Sensor network consists of cheap, tiny devices which can be incarcerated to provide erroneous data to the concerned authority. Hence integrity and authentication becomes a foremost concern. This paper utilises both preventive and detection measures to cope with different kinds of attacks in the network layer. In this paper, pairwise key is being generated utilising auxiliary nodes. The paper enhances security of the network against Sybil attack, Sinkhole attack and Wormhole attack.

Keywords: attack prevention; attack detection; steganography; pairwise key generation; auxiliary nodes; network security; compromised nodes; wireless sensor networks; WSNs; wireless networks; sybil attacks; sinkhole attacks; wormhole attacks.

DOI: 10.1504/IJSN.2014.060743

International Journal of Security and Networks, 2014 Vol.9 No.2, pp.78 - 84

Received: 02 Jan 2013
Accepted: 05 Oct 2013

Published online: 28 Apr 2014 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article