Indian Journal of Science and Technology
Year: 2017, Volume: 10, Issue: 13, Pages: 1-7
Department of Computer Science and Engineering, Chandigarh University, Mohali – 140413, Punjab, India; [email protected]
Objectives: The main objective of this work is to isolate dictionary attack in wireless sensor networks. In the existing techniques Diffie-Helman algorithm has been proposed for the secure channel establishment from source to destination. In the Diffie-Helman algorithm dictionary attack is possible which reduce network performance. In this work, ECC technique is used which will detect malicious nodes from the network. Methods/Statistical Analysis: The wireless sensor networks are the kind of network in which sensor nodes can sense natural conditions and it is conveyed to the far spots like a backwoods, deserts and so on. Wireless sensor networks have faced various kinds of issues and challenges out of which maintaining the maintenance of security has proven to be one of the greatest concern. There has been a higher probability of occurrence of an attack due to all such problems related to security. All such discussions related to wireless sensor networks have been made in this paper. Wireless sensor networks have self configuring nature which results in dictionary attack is possible in the network. The delay and energy consumption get an increment as a result. The throughput of the network also gets affected as it gets reduced. Henceforth, for the purpose of detecting and isolating these dictionary attacks, a new technique has been put forth. The proposed technique is based on Elliptic Curve Cryptography (ECC), in which digital signature is calculated not which do not satisfy the condition of signature can be marked as malicious. Findings: In the existing technique to establish secure channel from source to destination, Diffie-Helman algorithm has been proposed in which secure session key is established. Due to self configuring nature of WSN dictionary attack is possible in the network. The ECC technique is used to ensure data integrity in the network. In the ECC technique, digital signature is generated as the source end and that digital signature is verified at the destination end. If the signature is not verified at the destination, then intrusion is detected in the network. To detect malicious node data integrity is confirmed per hop and the nodes which do not satisfy the condition of digital signature are detected as the malicious node. The proposed method is implemented in MATLAB and it has been analyzed that the network performance is increased in terms of energy consumption, throughput and delay after detection of malicious nodes.
Keywords: Dictionary Attack, Diffie-Helman, ECC, Intrusion, WSN
Subscribe now for latest articles and news.