|
|
Chain Identity Attestation (CIA) Method for preventing node cloning attack in Wireless Sensor Network
|
|
|
|
|
نویسنده
|
marbukhari n. ,yussoff y.m. ,bin syed adnan s.f. ,isa m.a.m. ,kamarudin n.h.
|
منبع
|
journal of telecommunication, electronic and computer engineering - 2017 - دوره : 9 - شماره : 1-4 - صفحه:151 -155
|
چکیده
|
This paper presents a new technique in preventing node cloning attack. the significant contribution of this method or technique is in preventing node impersonation attack in wireless sensor network (wsn). the new method named as chain identity attestation method (cia) was developed on the basis of diffie-hellman hard problem algorithm. the exclusivity of cia method is in the generation of node identity. in this method,the node identity is in each session. in other words,node identity is no longer fixed to a certain value. perfect forward secrecy attack model is used to prove the security of this cia method.
|
کلیدواژه
|
Node identity; Node impersonation; Trusted sensor node; Wireless sensor network
|
آدرس
|
instil research initiative groups,computer engineering department,university teknologi mara (uitm),shah alam,selangor, Malaysia, instil research initiative groups,computer engineering department,university teknologi mara (uitm),shah alam,selangor, Malaysia, instil research initiative groups,computer engineering department,university teknologi mara (uitm),shah alam,selangor, Malaysia, instil research initiative groups,computer engineering department,university teknologi mara (uitm),shah alam,selangor, Malaysia, instil research initiative groups,computer engineering department,university teknologi mara (uitm),shah alam,selangor, Malaysia
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|