ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor network
by N. Ambika; G.T. Raju
International Journal of Security and Networks (IJSN), Vol. 9, No. 2, 2014

Abstract: Network without security becomes a threat to integrity and authentication. Sensor network consists of cheap, tiny devices which can be incarcerated to provide erroneous data to the concerned authority. Hence integrity and authentication becomes a foremost concern. This paper utilises both preventive and detection measures to cope with different kinds of attacks in the network layer. In this paper, pairwise key is being generated utilising auxiliary nodes. The paper enhances security of the network against Sybil attack, Sinkhole attack and Wormhole attack.

Online publication date: Thu, 30-Apr-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com