Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Journal: International Journal of Computational Engineering Research(IJCER) (Vol.6, No. 3)Publication Date: 2015-03-31
Authors : Ibrahim Aziz Patwekar; V. C. Kotak;
Page : 23-24
Keywords : clone attack; man in middle attack; replay attack; zero knowledge protocol; WSN;
Abstract
The security mechanism are not used directly in wireless sensor networks compare to wired networks, there is no user control and insufficient energy resources. In wireless environment, proposing the scheme of detection of distributed sensor cloning attacks and Zero knowledge protocols (ZKP) are used to verifying authenticity of the sender sensor nodes. Cloning attack is concentrate on by attaching fingerprint which is unique that depends on the set of neighboring nodes and itself. Every message contains a finger print which sensor node sends.ZKP is used to avoid man in the middle attack and reply attacks from the important cryptographic information in wireless networks.
Other Latest Articles
- Lightning Acquisition and Processing On Sensor Node Using NI cRIO
- Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
- Ontology-Based Approach for Knowledge Retrieval in Al-Quran Holy Book
- MINIMIZING LOCALIZATION ERROR AND ENSURE SECURITY OF DVHOP APPROACH
- Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Network
Last modified: 2016-09-17 16:25:14