Reinstate Authentication of Nodes in Sensor Network

Reinstate Authentication of Nodes in Sensor Network

Ambika N.
Copyright: © 2020 |Pages: 18
ISBN13: 9781799843818|ISBN10: 1799843815|ISBN13 Softcover: 9781799853312|EISBN13: 9781799843825
DOI: 10.4018/978-1-7998-4381-8.ch006
Cite Chapter Cite Chapter

MLA

N., Ambika. "Reinstate Authentication of Nodes in Sensor Network." Sensor Network Methodologies for Smart Applications, edited by Salahddine Krit, et al., IGI Global, 2020, pp. 130-147. https://doi.org/10.4018/978-1-7998-4381-8.ch006

APA

N., A. (2020). Reinstate Authentication of Nodes in Sensor Network. In S. Krit, V. Bălaș, M. Elhoseny, R. Benlamri, & M. Bălaș (Eds.), Sensor Network Methodologies for Smart Applications (pp. 130-147). IGI Global. https://doi.org/10.4018/978-1-7998-4381-8.ch006

Chicago

N., Ambika. "Reinstate Authentication of Nodes in Sensor Network." In Sensor Network Methodologies for Smart Applications, edited by Salahddine Krit, et al., 130-147. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-4381-8.ch006

Export Reference

Mendeley
Favorite

Abstract

Transmitting data using the wireless medium provides a greater opportunity for the adversary to introduce different kinds of attacks into the network. Securing these monitoring devices deployed in unattended environments is a challenging task for the investigator. One of the preliminary practices adopted to ensure security is authentication. The chapter uses a new authentication procedure to evaluate the nodes. It uses sensors of a different caliber. Static and mobile nodes are used to bring the thought into play. The mobile nodes in the network demand vigorous defense mechanisms. The chapter defines a new authentication algorithm engaging itself to validate the communicating parties. The work is devised to substitute new nodes into the cluster to foster prolonged working of the network. By adopting the proposed protocol, backward and forward secrecy is preserved in the network. The work assures the security of the nodes by minimizing forge and replay attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.