Vampire Attack Detection in Wireless Sensor Networks | Abstract

ISSN ONLINE(2320-9801) PRINT (2320-9798)

Research Article Open Access

Vampire Attack Detection in Wireless Sensor Networks

Abstract

Secure Data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. A secure data transmission for clusterbased WSNs (CWSNs), where the clusters are formed dynamically and periodically. Two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. The feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to illustrate the efficiency of the proposed protocols. It improves the security overhead and the energy consumption.

S. Jayashree, T.Mohanraj

To read the full article Download Full Article | Visit Full Article