Open Access   Article Go Back

Malicious Node Detection in Wireless Sensor Networks using Cryptographic Authentication and Certificate Revocation Mechanism

T. C. Swetha Priya1 , A. Kanaka Durga2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-12 , Page no. 16-20, Dec-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i12.1620

Online published on Dec 31, 2019

Copyright © T. C. Swetha Priya, A. Kanaka Durga . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T. C. Swetha Priya, A. Kanaka Durga, “Malicious Node Detection in Wireless Sensor Networks using Cryptographic Authentication and Certificate Revocation Mechanism,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.12, pp.16-20, 2019.

MLA Style Citation: T. C. Swetha Priya, A. Kanaka Durga "Malicious Node Detection in Wireless Sensor Networks using Cryptographic Authentication and Certificate Revocation Mechanism." International Journal of Computer Sciences and Engineering 7.12 (2019): 16-20.

APA Style Citation: T. C. Swetha Priya, A. Kanaka Durga, (2019). Malicious Node Detection in Wireless Sensor Networks using Cryptographic Authentication and Certificate Revocation Mechanism. International Journal of Computer Sciences and Engineering, 7(12), 16-20.

BibTex Style Citation:
@article{Priya_2019,
author = {T. C. Swetha Priya, A. Kanaka Durga},
title = {Malicious Node Detection in Wireless Sensor Networks using Cryptographic Authentication and Certificate Revocation Mechanism},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2019},
volume = {7},
Issue = {12},
month = {12},
year = {2019},
issn = {2347-2693},
pages = {16-20},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4967},
doi = {https://doi.org/10.26438/ijcse/v7i12.1620}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i12.1620}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4967
TI - Malicious Node Detection in Wireless Sensor Networks using Cryptographic Authentication and Certificate Revocation Mechanism
T2 - International Journal of Computer Sciences and Engineering
AU - T. C. Swetha Priya, A. Kanaka Durga
PY - 2019
DA - 2019/12/31
PB - IJCSE, Indore, INDIA
SP - 16-20
IS - 12
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
500 501 downloads 229 downloads
  
  
           

Abstract

Security is one of the major issues in the current scenario. Because of the wireless nature of the nodes present in Wireless Sensor Networks, there is a chance of the nodes getting easily affected to severe security attacks. One such attack is a Selective Forwarding Attack in which the malicious nodes gain access to the wireless network and interrupts the data communication, overwrites the data packets, drops the packets and degrades the wireless network performance. In this paper, an effective cryptographic protocol using Authentication technique is proposed. To separate the attacking nodes in participating in the future networking activities, a Certificate Revocation Method is also proposed. This paper guarantees security to the nodes and do not allow access to any of the affected nodes by using a more efficient Authentication method. It also improves the performance of a network. Through simulation, the correctness and efficiency of the scheme is verified.

Key-Words / Index Term

Authentication, Certificates, Cluster, malicious node, message digest, Revocation, Wireless Sensor Network

References

[1] Aggarwal, S., Goyal Astt Professor, N., & Aggarwal Astt Professor MRCE, K. (2014). “A review of Comparative Study of MD5 and SHA Security Algorithm”. International Journal of Computer Applications.
[2] Wei Liu, Student Member, IEEE, Hiroki Nishiyama, Member, IEEE, Nirwan Ansari, Fellow, IEEE, Jie Yang, and Nei Kato, Senior Member, IEEE “Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks”.
[3] Youtao Zhang, Jun Yang, Weijia Li, Linzhang Wang, Lingling Jin: “An authentication scheme for locating compromised sensor nodes in WSNs”, Journal of Network and Computer Applications, vol.33, pp.50-62, 2010.
[4] Sungwook Kim, “Effective Certificate Revocation Scheme based on Weighted Voting Game Approach”, IET Information Security, Vol. 10, No. 4, pp. 180-187, 2016.
[5] K. Park, H. Nishiyama, N. Ansari, And N. Kato, “Certificate Revocation To Cope With False Accusations In Mobile Ad Hoc Networks”, In Proc. 2010 Ieee 71st Vehicular Technology Conference: Vtc2010-Spring, Taipei, Taiwan, May 16-19, 2010.
[6] Madhumita Panda, “Security in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER) 2014 Volume-03, Issue-01, pp-50-56.
[7] Priti Rathi, Parikshit Mahalle, “Certificate Revocation in Mobile Ad Hoc Networks,” International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 1, January 2013.
[8] Khawla Naji Shnaikat and Ayman Ahmed AlQudah, “Key Management Techniques in Wireless Sensor Networks”, International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014.
[9] Claude Crêpeau and Carlton R. Davis,” A Certificate Revocation Scheme for Wireless Ad Hoc Networks“ School of Computer Science, McGill University, Montreal, QC, Canada H3A 2A7.
[10] E.K. Neena and C. Balakrishnan,”Cluster Based Certificate Revocation of Attacker’s Nodes in MANET”, International Journal of Computer Science and Engineering(IJCSE), Vol 2, Issue 1, January 2014