CFP last date
20 January 2025
Reseach Article

A-SMOCK: Authenticated SMOCK for Wireless Sensor Networks

by Ashly Thomas, N. Dhinakaran, P. Anitha Christy Angelin
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 19 - Number 6
Year of Publication: 2011
Authors: Ashly Thomas, N. Dhinakaran, P. Anitha Christy Angelin
10.5120/2369-3119

Ashly Thomas, N. Dhinakaran, P. Anitha Christy Angelin . A-SMOCK: Authenticated SMOCK for Wireless Sensor Networks. International Journal of Computer Applications. 19, 6 ( April 2011), 1-5. DOI=10.5120/2369-3119

@article{ 10.5120/2369-3119,
author = { Ashly Thomas, N. Dhinakaran, P. Anitha Christy Angelin },
title = { A-SMOCK: Authenticated SMOCK for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 19 },
number = { 6 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume19/number6/2369-3119/ },
doi = { 10.5120/2369-3119 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:15.283732+05:30
%A Ashly Thomas
%A N. Dhinakaran
%A P. Anitha Christy Angelin
%T A-SMOCK: Authenticated SMOCK for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 19
%N 6
%P 1-5
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The most major requirements of wireless networks in the current network context are security, scalability and memory efficiency. Most of the earlier implementations use cryptographic key exchanges alone for imposing security but mostly proved to be less secure with the presence of many attacks like IP-spoofing and masquerading. This is because, the security is present only during communication i.e., only message integrity is ensured and not the user authenticity. Hence we are trying to include an authentication scheme along with the already existing integrity scheme to provide maximum security all through the lifetime of networks. In this paper, we consider different options for providing authentication, analyze them and find which method can be used for producing better results

References
  1. Jennifer Yicka, Biswanath Mukherjeea, and Dipak Ghosa, “Wireless sensor network survey,” Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 52 , no.12, pp. 2292-2330, August, 2008.
  2. Jaydip Sen, “A Survey on Wireless Sensor Network Security,” International Journal of Communication Networks and Information Security, vol. 1, no. 2, pp. 55 - 78, August 2009.
  3. S. Kent and T. Polk, “Public-key infrastructure (x.509) (pkix) charter.” [Online].Available: http://www.ietf.org/html.charters/pkixcharter.html.
  4. L. Zhou and Z. J. Haas, “Securing Ad Hoc Network”, IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov. 1999.
  5. S. Capkun, L. Buttyan, and J. P. Hubaux, “Self organized public-key management for mobile ad hoc networks,” IEEE Trans. Mobile Computing, vol. 2,no. 1,pp. 52-64, January - March 2003.
  6. Yang Xiao, Venkata K. Rayi, Bo Sun, Xiaojiang Du, Fei Hu, and Michael Galloway, “A survey of key management schemes in wireless sensor networks,” Computer Communications In Special issue on security on wireless ad hoc and sensor networks, vol. 30, no. 11-12, pp. 2314-2341, September 2007.
  7. Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, and Whay C. Lee, “SMOCK: A Scalable method of cryptographic key management scheme for wireless ad hoc networks,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 140-150 , March 2009.
  8. S.A. Camtepe and B. Yener, “Combinatorial design of key distribution mechanisms for wireless sensor networks,” In Pro 9th European Symposium on Research in Computer Security (ESORICS 04), pp. 346-358, 2004.
  9. Kai Zeng, Kannan Govindan, and Prasant Mohapatra, “Non-Cryptographic Authentication and Identification in Wireless Networks”, in IEEE Wireless Communications, vol. 17, no. 5, pp. 56 - 62 , October 2010.
Index Terms

Computer Science
Information Sciences

Keywords

ASMOCK Authenticated SMOCK