Wireless Sensor Networks (WSNs) can be used to monitor environments, and therefore have broad range of interesting applications. The applications which may use WSN can be of sensitive nature and therefore might require enhanced secured environment. As sensors are used to monitor sensitive areas therefore Security and energy efficiency is essential consideration when designing wireless sensor networks (WSNs). The Sensor nodes get their power from batteries. Since the sensor nodes are deployed in harsh environment they cannot be recharged. Due to unattended deployment and inability of recharging, the power consumption of the nodes should be optimal. To implement minimum power consumption Sensor networks periodically place nodes to sleep. This is achieved by using the media access control (MAC) protocols. These protocols are designed in such a way that they reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode as much as possible. This leads to power saving. The MAC protocols change the sleep time based on the type of communication required. However, malicious nodes can be introduced in the network and these attackers use their information about the MAC protocol, by manipulating the sleep time of the node, so that life time of the node reduces. This is called as Denial of sleep attack .This paper, addresses the Denial of sleep attack in WSN while at the same time proposing a scheme for authenticating the new nodes which try to change the sleep schedule of the nodes. Only transmissions from valid nodes are accepted. Our scheme uses zero knowledge protocol (ZKP) for verifying the authenticity of the sensor nodes which pass the sleep synchronization messages. Also to enhance security further the interlock protocol is used during key exchange. The paper presents a detailed analysis for various scenarios and also analyzes the performance while implementing this secure authentication.
DDOS attacks have increased lately to an extent where large companies have lost millions. They pose a large threat to internet security. This paper explains DOS and DDOS attacks and their types as well as two computer softwares -LOIC and DDOSIM -to launch DDOS attacks and the history of the well-known botnets and DDOS attacks. A solution for DDOS protection at application layer is also proposed. It explores the combination of various tools and techniques like ingress filtering, IP address blacklist checker and dividing the server as a measure to limit the attacks.
General TermsDDOS protection, dividing and limiting, types of DOS attacks, types of DDOS attacks.
Abstract-WSN consists of large number of Sensor Nodes where each Sensor Nodes in the network are connected by a wireless channels. The node will sense the environmental data and sends to the other sensor nodes or Base Station. During the transmission of data from one node to another node, different security techniques are used. To implement security, such as confidentiality, integrity and authentication, keys are needed. Key Management is important for implementing security in a wireless Sensor Network. Wireless Sensor Networks are believed to be the enabling technology for ambient intelligence. The common attacks that can be made on WSN are attacks like eavesdropping, man-in-the middle attack and passive attacks like replay attacks, DoS attacks, and cloning attacks. An authentication protocol can enable the senders to confirm that the packet was truly sent to authentic receiver. Our solution achieves proper authentication while keeping energy consumption at minimum . A separate key for each node to node communication is generated so that detection of malicious node is easily possible.The use of timestamping provides additional security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.