Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Journal: International Journal of Computational Engineering Research(IJCER) (Vol.6, No. 3)Publication Date: 2015-03-31
Authors : Ibrahim Aziz Patwekar;
Page : 16-18
Keywords : clone attack; man in middle attack; replay attack; zero knowledge protocol; WSN.;
Abstract
The security mechanism are not used directly in wireless sensor networks compare to wired networks, there is no user control and insufficient energy resources. In wireless environment, proposing the scheme of detection of distributed sensor cloning attacks and Zero knowledge protocols (ZKP) are used to verifying authenticity of the sender sensor nodes. Cloning attack is concentrate on by attaching fingerprint which is unique that depends on the set of neighboring nodes and itself. Every message contains a finger print which sensor node sends.ZKP is used to avoid man in the middle attack and reply attacks from the important cryptographic information in wireless networks
Other Latest Articles
- Ontology-Based Approach for Knowledge Retrieval in Al-Quran Holy Book
- MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH
- Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network
- Experimental Investigation of Multi Aerofoil Configurations Using Propeller Test Rig
- On intuitionistic fuzzy
Last modified: 2016-09-17 16:23:23