ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security

Journal: International Journal of Computational Engineering Research(IJCER) (Vol.6, No. 3)

Publication Date:

Authors : ;

Page : 16-18

Keywords : clone attack; man in middle attack; replay attack; zero knowledge protocol; WSN.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The security mechanism are not used directly in wireless sensor networks compare to wired networks, there is no user control and insufficient energy resources. In wireless environment, proposing the scheme of detection of distributed sensor cloning attacks and Zero knowledge protocols (ZKP) are used to verifying authenticity of the sender sensor nodes. Cloning attack is concentrate on by attaching fingerprint which is unique that depends on the set of neighboring nodes and itself. Every message contains a finger print which sensor node sends.ZKP is used to avoid man in the middle attack and reply attacks from the important cryptographic information in wireless networks

Last modified: 2016-09-17 16:23:23