2013
DOI: 10.1109/twc.2013.050313.120929
|View full text |Cite
|
Sign up to set email alerts
|

MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks

Abstract: Abstract-Ensuring the security of communication and access control in Wireless Sensor Networks (WSNs) is of paramount importance. In this paper, we present a security mechanism, MoteSec-Aware, built on the network layer for WSNs with focus on secure network protocol and data access control. In the secure network protocol of MoteSec-Aware, a Virtual Counter Manager (VCM) with a synchronized incremental counter is presented to detect the replay and jamming attacks based on the symmetric key cryptography using AE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0
1

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 26 publications
(34 reference statements)
0
16
0
1
Order By: Relevance
“…To handle this it is necessary that some authentication mechanism should be there for preventing the communications in the network from DoS attacks. There have been many authentication schemes proposed for wireless sensor networks [1]. But Constrained Function based Authentication (CFA) [13] is only scheme of authentication which is supporting en-route filtering with only single packet overhead.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…To handle this it is necessary that some authentication mechanism should be there for preventing the communications in the network from DoS attacks. There have been many authentication schemes proposed for wireless sensor networks [1]. But Constrained Function based Authentication (CFA) [13] is only scheme of authentication which is supporting en-route filtering with only single packet overhead.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…SPIN technique uses synchronization between sender and receiver in system. MiniSec achieves low energy consumption by appending a few bits of the IV to each packet [1]. Another works focuses on secure network protocol and there is no consideration for security of data stored inside the node.…”
Section: Liteature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…For securing the networks against jamming attacks, detection techniques schemes [2,5,6,8] and countermeasures [7,[9][10][11][12] were presented in some literatures. In [5], DOS attacks detection in IEEE 802.11 networks was studied, and a robust nonparametric detection mechanism for the CSMA/CA media-access control layer DOS attacks was presented.…”
Section: Introductionmentioning
confidence: 99%