Wireless Sensor Network Security Model Using Zero Knowledge Protocol
Wireless Sensor Network Security Model Using Zero Knowledge Protocol
Wireless Sensor Network Security Model Using Zero Knowledge Protocol
www.iosrjen.org
1|Page
2|Page
SCREEN SHOTS
3|Page
4|Page
.
VI.
CONCLUSION
In this project, we proposed a new security model to address three important active attacks namely
cloning attack, MITM attack and Replay attack. We used the concept of zero knowledge protocol which ensures
non-transmission of crucial information between the prover and verifier. The proposed model uses social finger
print based on s-disjunct code together with ZKP to detect clone attacks and avoid MITM and replay attack. We
analysed various attack scenarios, cryptographic strength and performance of the proposed model.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
Kai Xing Fang, Liu Xiuzhen, Cheng David, H. C. Du, Real- Time Detection of Clone Attacks in Wireless
Sensor Networks,Proceedings of the 28th International Conference on DistributedComputing Systems,
2008, Pages 3-10.
Nikos Komninos, DimitrisVergados, Christos Douligeris, Detecting Unauthorized and Compromised
Nodes in Mobile Adhoc Networks Journal of Ad Hoc Networks, Volume 5, Issue 3, April2007, Pages:
289-298 .
KlempousRyszard, Nikodem Jan, Radosz Lukasz, Raus Norbert, Adaptive Misbehavior Detection in
Wireless Sensors NetworkBased on Local Community Agreement, 14th Annual IEEE International
Conference and Workshops on the Engineering of Computer- Based systems, ECBS2007, 2007,
Page(s):153-160.
KrontirisIoannis, TassosDimitriou and Felix C. Freiling, Towards Intrusion detection In Wireless Sensor
Networks, In Proc. of the13th European Wireless Conference, 2007.
Joseph Binder, Hans Peter Bischof, Zero Knowledge Proofs of Identity for Ad Hoc Wireless Networks
An In-Depth Study, TechnicalReport, 2003. http://www.cs.rit.edu/ jsb7384/zkp-survey.pdf
A. A. Taleb, Dhiraj K. Pradhan and T. KocakA Technique to Identify and Substitute Faulty Nodes in
Wireless Sensor Networks Proceedings of the 2009 Third International Conference on
SensorTechnologies and Applications, 2009, Pages: 346-351
AUTHORS PROFILE
Author 1: P. Srilakshmi Received M.Tech degree in Web Technologies from St. Marys College
of Engineering and Technology, Deshmukh, Hyderabad, Affliated to Jawaharlal Nehru Technological
University in 2012, B.Tech degree in Information Technology from Jagannadh Institute of
Technology and Management, Parlakhemundi, Orissa. She is working as Associate Professor in the
department of Computer Science and Engineering at Avanthi Institute of Engineering and Technology,
Visakhapatnam. Her date of birth is May 29th 1982. Her Area of expertise includes Network Security, data
mining, Mobile communications, Web Applications and Database Management Systems.
Author 2: Rita Roy received M.Tech degree in Computer Science from GITAM in 2014, B.Tech
degree in CSE from AMIETE. She is working as Assistant Professor in the department of Computer
Science and Engineering at Avanthi Institute of Engineering and Technology, Visakhapatnam. Her
current research interests include Image Processing, Data mining, Networking, Compiler Design, and
Network Security.
5|Page